Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption

被引:1
|
作者
Lu, Yang [1 ]
Li, Jiguo [1 ]
机构
[1] Hohai Univ, Coll Comp & Informat Engn, Nanjing, Jiangsu, Peoples R China
关键词
forward security; identity-based encryption; identity-based binary tree encryption; standard model; PUBLIC-KEY ENCRYPTION;
D O I
10.1109/ISISE.2012.50
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a generic construction of forward-secure identity-based encryption. We first introduce a relaxed variant of hierarchical identity-based encryption called identity-based binary tree encryption and construct a concrete identity-based binary tree encryption scheme which is provably secure in the standard model. We then show that forward-secure identity-based encryption can be generically constructed from identity-based binary tree encryption. Based on the proposed identity-based binary tree encryption scheme, we obtain a direct chosen-ciphertext secure forward-secure identity-based encryption scheme without random oracles.
引用
收藏
页码:199 / 202
页数:4
相关论文
共 50 条
  • [31] Efficient Identity-Based Encryption from LWR
    Cheon, Jung Hee
    Cho, Haejin
    Jung, Jaewook
    Lee, Joohee
    Lee, Keewoo
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 225 - 241
  • [32] Puncturable Identity-Based Encryption from Lattices
    Dutta, Priyanka
    Susilo, Willy
    Duong, Dung Hoang
    Roy, Partha Sarathi
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 571 - 589
  • [33] Forward-secure identity-based signature: Security notions and construction
    Yu, Jia
    Hao, Rong
    Kong, Fanyu
    Cheng, Xiangguo
    Fan, Jianxi
    Chen, Yangkui
    [J]. INFORMATION SCIENCES, 2011, 181 (03) : 648 - 660
  • [34] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [35] Efficient Identity-based Encryption from Lattice
    Chen, Huiyan
    Chen, Dongmei
    Zhang, Yanshuo
    [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CLOUD COMPUTING COMPANION (ISCC-C), 2014, : 84 - 90
  • [36] Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
    Shao, Jun
    Cao, Zhenfu
    [J]. INFORMATION SCIENCES, 2012, 206 : 83 - 95
  • [37] Backward Compatible Identity-Based Encryption
    Kim, Jongkil
    [J]. SENSORS, 2023, 23 (09)
  • [38] Complete robustness in identity-based encryption
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8782 : 342 - 349
  • [39] Identity-based encryption for sensor networks
    Oliveira, Leonardo B.
    Dahab, Ricardo
    Lopez, Julio
    Daguano, Felipe
    Loureiro, Antonio A. F.
    [J]. FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 290 - +
  • [40] Complete Robustness in Identity-Based Encryption
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    [J]. PROVABLE SECURITY, PROVSEC 2014, 2014, 8782 : 342 - 349