Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack

被引:0
|
作者
Lai, Junzuo [1 ]
Deng, Robert H. [2 ]
Liu, Shengli [3 ]
Weng, Jian [1 ]
Zhao, Yunlei [4 ,5 ]
机构
[1] Jinan Univ, Dept Comp Sci, Jinan, Peoples R China
[2] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
[3] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
[4] Fudan Univ, Software Sch, SKLOIS, Beijing, Peoples R China
[5] KLAISTC, Wuhan, Peoples R China
来源
关键词
identity-based encryption; chosen ciphertext security; selective opening security; DUAL SYSTEM ENCRYPTION; TRAPDOOR FUNCTIONS; HIBE; CONSTRUCTIONS; LOSSY; IBE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security against selective opening attack (SOA) requires that in a multi-user setting, even if an adversary has access to all ciphertexts from users, and adaptively corrupts some fraction of the users by exposing not only their messages but also the random coins, the remaining unopened messages retain their privacy. Recently, Bellare, Waters and Yilek considered SOA-security in the identity-based setting, and presented the first identity-based encryption (IBE) schemes that are proven secure against selective opening chosen plaintext attack (SO-CPA). However, how to achieve SO-CCA security for IBE is still open. In this paper, we introduce a new primitive called extractable IBE and define its IND-ID-CCA security notion. We present a generic construction of SO-CCA secure IBE from an IND-ID-CCA secure extractable IBE with "One-Sided Public Openability"(1SPO), a collision-resistant hash function and a strengthened cross-authentication code. Finally, we propose two concrete constructions of extractable 1SPO-IBE schemes, resulting in the first simulation-based SO-CCA secure IBE schemes without random oracles.
引用
收藏
页码:77 / 92
页数:16
相关论文
共 50 条
  • [41] Chosen-Ciphertext Secure Multi-authority Fuzzy Identity-Based Key Encapsulation without ROM
    Fang, Liming
    Wang, Jiandong
    Ren, Yongjun
    Xia, Jinyue
    Bian, Shizhu
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 326 - 330
  • [42] Universal Chosen-Ciphertext Attack for a Family of Image Encryption Schemes
    Chen, Junxin
    Chen, Lei
    Zhou, Yicong
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2021, 23 : 2372 - 2385
  • [43] Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
    Liang, Kaitai
    Chu, Cheng-Kang
    Tan, Xiao
    Wong, Duncan S.
    Tang, Chunming
    Zhou, Jianying
    [J]. THEORETICAL COMPUTER SCIENCE, 2014, 539 : 87 - 105
  • [44] Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption
    Sur, Chul
    Jung, Chae Duk
    Park, Youngho
    Rhee, Kyung Hyune
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2010, 6109 : 214 - +
  • [45] Unidirectional chosen-ciphertext secure proxy re-encryption
    Libert, Benoit
    Vergnaud, Damien
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2008, 2008, 4939 : 360 - +
  • [46] Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
    Libert, Benoit
    Vergnaud, Damien
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (03) : 1786 - 1802
  • [48] Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption
    Luo, Fucai
    Al-Kuwari, Saif
    Susilo, Willy
    Duong, Dung Hoang
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2398 - 2408
  • [49] Direct chosen-ciphertext secure hierarchical ID-Based encryption schemes
    Park, Jong Hwan
    Lee, Dong Hoon
    [J]. PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2007, 4582 : 94 - +
  • [50] Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited
    Huang, Zhengan
    Liu, Shengli
    Qin, Baodong
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 369 - 385