Receiver Selective Opening Chosen Ciphertext Secure Identity-Based Encryption

被引:0
|
作者
Hara, Keisuke [1 ,3 ]
Matsuda, Takahiro [3 ]
Tanaka, Keisuke [2 ]
机构
[1] Tokyo Inst Technol, Dept Informat Sci, Tokyo 1528550, Japan
[2] Tokyo Inst Technol, Tokyo 1528550, Japan
[3] Natl Inst Adv Ind Sci & Technol, Tokyo 1350064, Japan
关键词
identity-based encryption; receiver selective opening security; chosen ciphertext attack;
D O I
10.1587/transfun.2021CIP0006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the situation where there are one sender and multiple receivers, a receiver selective opening (RSO) attack for an identity-based encryption (IBE) scheme considers adversaries that can corrupt some of the receivers and get their user secret keys and plaintexts. Security against RSO attacks for an IBE scheme ensures confidentiality of ciphertexts of uncorrupted receivers. In this paper, we formalize a definition of RSO security against chosen ciphertext attacks (RSO-CCA security) for IBE and propose the first RSO-CCA secure IBE schemes. More specifically, we construct an RSO-CCA secure IBE scheme based on an IND-ID-CPA secure IBE scheme and a non-interactive zero-knowledge proof system with unbounded simulation soundness and multi-theorem zero-knowledge. Through our generic construction, we obtain the first pairing-based and lattice-based RSO-CCA secure IBE schemes.
引用
收藏
页码:160 / 172
页数:13
相关论文
共 50 条
  • [31] Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
    Zhou, Yanwei
    Yang, Bo
    Xia, Zhe
    Zhang, Mingwu
    Mu, Yi
    [J]. THEORETICAL COMPUTER SCIENCE, 2020, 809 : 277 - 295
  • [32] CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud
    Sun, Yinxia
    Susilo, Willy
    Zhang, Futai
    Fu, Anmin
    [J]. IEEE ACCESS, 2018, 6 : 56977 - 56983
  • [33] Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext
    Kim, Jongkil
    Susilo, Willy
    Au, Man Ho
    Seberry, Jennifer
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 679 - 693
  • [34] New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem
    Park, Jong Hwan
    Lee, Kwangsu
    Lee, Dong Hoon
    [J]. INFORMATION SCIENCES, 2015, 325 : 256 - 270
  • [35] Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption
    Tseng, Yi-Fan
    Fan, Chun-, I
    Lin, Chih-Wen
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (03) : 182 - 202
  • [36] Chosen-ciphertext secure threshold identity-based key encapsulation without random oracles
    Galindo, David
    Kiltz, Eike
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2006, 4116 : 173 - 185
  • [37] Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
    Kiltz, Eike
    Galindo, David
    [J]. THEORETICAL COMPUTER SCIENCE, 2009, 410 (47-49) : 5093 - 5111
  • [38] Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
    Kiltz, Eike
    Galindo, David
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 336 - 347
  • [39] FORWARD -SECURE IDENTITY -BASED ENCRYPTION WITH DIRECT CHOSEN-CIPHERTEXT SECURITY IN THE STANDARD MODEL
    Lu, Yang
    Li, Jiguo
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2017, 11 (01) : 161 - 177
  • [40] Secure and practical identity-based encryption
    Naccache, D.
    [J]. IET INFORMATION SECURITY, 2007, 1 (02) : 59 - 64