Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack

被引:0
|
作者
Lai, Junzuo [1 ]
Deng, Robert H. [2 ]
Liu, Shengli [3 ]
Weng, Jian [1 ]
Zhao, Yunlei [4 ,5 ]
机构
[1] Jinan Univ, Dept Comp Sci, Jinan, Peoples R China
[2] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
[3] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
[4] Fudan Univ, Software Sch, SKLOIS, Beijing, Peoples R China
[5] KLAISTC, Wuhan, Peoples R China
来源
关键词
identity-based encryption; chosen ciphertext security; selective opening security; DUAL SYSTEM ENCRYPTION; TRAPDOOR FUNCTIONS; HIBE; CONSTRUCTIONS; LOSSY; IBE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security against selective opening attack (SOA) requires that in a multi-user setting, even if an adversary has access to all ciphertexts from users, and adaptively corrupts some fraction of the users by exposing not only their messages but also the random coins, the remaining unopened messages retain their privacy. Recently, Bellare, Waters and Yilek considered SOA-security in the identity-based setting, and presented the first identity-based encryption (IBE) schemes that are proven secure against selective opening chosen plaintext attack (SO-CPA). However, how to achieve SO-CCA security for IBE is still open. In this paper, we introduce a new primitive called extractable IBE and define its IND-ID-CCA security notion. We present a generic construction of SO-CCA secure IBE from an IND-ID-CCA secure extractable IBE with "One-Sided Public Openability"(1SPO), a collision-resistant hash function and a strengthened cross-authentication code. Finally, we propose two concrete constructions of extractable 1SPO-IBE schemes, resulting in the first simulation-based SO-CCA secure IBE schemes without random oracles.
引用
收藏
页码:77 / 92
页数:16
相关论文
共 50 条
  • [1] Receiver Selective Opening Chosen Ciphertext Secure Identity-Based Encryption
    Hara, Keisuke
    Matsuda, Takahiro
    Tanaka, Keisuke
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105A (03) : 160 - 172
  • [2] A CHOSEN-CIPHERTEXT SECURE IDENTITY-BASED BROADCAST ENCRYPTION SCHEME
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 3556 - +
  • [3] Efficient chosen-ciphertext secure identity-based encryption with wildcards
    Birkett, James
    Dent, Alexander W.
    Neven, Gregory
    Schuldt, Jacob C. N.
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 274 - +
  • [4] Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
    Fehr, Serge
    Hofheinz, Dennis
    Kiltz, Eike
    Wee, Hoeteck
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 381 - +
  • [5] Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    Li, Yan
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (01) : 35 - 50
  • [6] Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption
    Weiran Liu
    Jianwei Liu
    Qianhong Wu
    Bo Qin
    Yan Li
    [J]. International Journal of Information Security, 2016, 15 : 35 - 50
  • [7] Homomorphic Authenticated Encryption Secure against Chosen-Ciphertext Attack
    Joo, Chihong
    Yun, Aaram
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT II, 2014, 8874 : 173 - 192
  • [8] Chosen-ciphertext security from identity-based encryption
    Canetti, R
    Halevi, S
    Katz, J
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 207 - 222
  • [9] Identity-Based Encryption Secure against Selective Opening Attack
    Bellare, Mihir
    Waters, Brent
    Yilek, Scott
    [J]. THEORY OF CRYPTOGRAPHY, 2011, 6597 : 235 - +
  • [10] Chosen-ciphertext security from identity-based encryption
    Boneh, Dan
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    [J]. SIAM JOURNAL ON COMPUTING, 2006, 36 (05) : 1301 - 1328