New Fuzzy Identity-Based Encryption in the Standard Model

被引:4
|
作者
Ren, Yanli [1 ,2 ]
Gu, Dawu [1 ]
Wang, Shuozhong [2 ]
Zhang, Xinpeng [2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Shanghai Univ, Sch Commun & Informat Engn, Shanghai 200072, Peoples R China
基金
高等学校博士学科点专项科研基金;
关键词
cryptography; fuzzy identity-based encryption; IND-FID-CCA2; security; standard model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a fuzzy identity-based encryption (IBE) scheme, a user with the secret key for an identity ID is able to decrypt a ciphertext encrypted with another identity ID' if and only if ID and ID' are within a certain distance of each other as judged by some metric Fuzzy IBE also allows to encrypt a document to all users that have a certain set of attributes In 2005, Sahai and Waters first proposed the notion of fuzzy IBE and proved the security of their scheme under the selective-ID model. Currently, there is no fuzzy IBE scheme available that is fully CCA2 seem e in the standard model. In this paper, we propose a new fuzzy IBE scheme which achieves IND-FID-CCA2 security in the standard model with a tight reduction. Moreover, the size of public parameters is independent of the number of attributes associated with an identity.
引用
收藏
页码:393 / 407
页数:15
相关论文
共 50 条
  • [1] A new Hierarchical identity-based encryption in the standard model
    Zhang, Le-You
    Hu, Yu-Pu
    Wu, Qing
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (04): : 937 - 941
  • [2] Identity-based encryption with wildcards in the standard model
    School of Information Engineering, Chang'an University, Xi'an, 710064, China
    不详
    不详
    [J]. J. China Univ. Post Telecom., 2009, 1 (64-68,80):
  • [4] New Construction of Fuzzy Identity-Based Encryption
    Li, XiMing
    Yang, Bo
    Zhang, MingWu
    [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL I, 2009, : 647 - 651
  • [5] New identity-based broadcast encryption with constant ciphertexts in the standard model
    Wu Q.
    Wang W.
    [J]. Journal of Software, 2011, 6 (10) : 1929 - 1936
  • [6] Fuzzy identity-based encryption
    Sahai, A
    Waters, B
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 457 - 473
  • [7] Identity-based Threshold Broadcast Encryption in the Standard Model
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2010, 4 (03): : 400 - 410
  • [8] Revocable identity-based matchmaking encryption in the standard model
    Jiang, Zhe
    Wang, Xiwen
    Zhang, Kai
    Gong, Junqing
    Chen, Jie
    Qian, Haifeng
    [J]. IET INFORMATION SECURITY, 2023, 17 (04) : 567 - 581
  • [9] Novel identity-based broadcast encryption in the standard model
    Zhang, Leyou
    Xu, Zhiqin
    [J]. ICIC Express Letters, Part B: Applications, 2013, 4 (03): : 663 - 669
  • [10] Unbounded Hierarchical Identity-based Encryption in the Standard Model
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    Yang, Yang
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (01): : 105 - 112