CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not q-type) Assumptions

被引:3
|
作者
Tomita, Toi [1 ,2 ]
Ogata, Wakaha [1 ]
Kurosawa, Kaoru [3 ]
机构
[1] Tokyo Inst Technol, Tokyo, Japan
[2] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
[3] Ibaraki Univ, Ibaraki, Japan
关键词
Identity-based key-encapsulation; Leakage-resilience; CCA-security; ENCRYPTION; CRYPTOGRAPHY;
D O I
10.1007/978-3-030-26834-3_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a new leakage-resilient identity-based encryption (IBE) scheme that is secure against chosen-ciphertext attacks (CCA) in the bounded memory leakage model. It is the first CCA-secure leakage-resilient IBE scheme which does not depend on q-type assumptions. More precisely, it is secure under the DLIN assumption for symmetric bilinear groups and under the XDLIN assumption for asymmetric bilinear groups, respectively.
引用
收藏
页码:3 / 22
页数:20
相关论文
共 24 条
  • [1] CCA-Secure Leakage-Resilient Identity-Based Encryption without q-Type Assumptions
    Tomita, Toi
    Ogata, Wakaha
    Kurosawa, Kaoru
    Kuwayama, Ryo
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (10) : 1157 - 1166
  • [2] A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme
    Li, Jiguo
    Teng, Meilin
    Zhang, Yichen
    Yu, Qihong
    [J]. COMPUTER JOURNAL, 2016, 59 (07): : 1066 - 1075
  • [3] New leakage-resilient CCA-secure public key encryption
    Kurosawa, Kaoru
    Nojima, Ryo
    Phong, Le Trieu
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2013, 7 (04) : 297 - 312
  • [4] Continuous Leakage-resilient Broadcast Key-encapsulation Mechanism with CCA Security
    Qiao, Zi-Rui
    Yang, Qi-Liang
    Zhou, Yan-Wei
    Yang, Bo
    Xia, Zhe
    Zhang, Ming-Wu
    [J]. Ruan Jian Xue Bao/Journal of Software, 2023, 34 (02): : 818 - 832
  • [5] Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
    Chow, Sherman S. M.
    Dodis, Yevgeniy
    Rouselakis, Yannis
    Waters, Brent
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 152 - 161
  • [6] Practical continuous leakage-resilient CCA secure identity-based encryption
    Zhou, Yanwei
    Yang, Bo
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2020, 14 (04)
  • [7] Practical continuous leakage-resilient CCA secure identity-based encryption
    Yanwei Zhou
    Bo Yang
    [J]. Frontiers of Computer Science, 2020, 14
  • [8] Leakage-resilient identity-based cryptography from minimal assumptions
    Zhou, Yanwei
    Yang, Bo
    Qiao, Zirui
    Xia, Zhe
    Zhang, Mingwu
    Mu, Yi
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (11) : 3757 - 3801
  • [9] Leakage-resilient identity-based cryptography from minimal assumptions
    Yanwei Zhou
    Bo Yang
    Zirui Qiao
    Zhe Xia
    Mingwu Zhang
    Yi Mu
    [J]. Designs, Codes and Cryptography, 2023, 91 : 3757 - 3801
  • [10] CCA-Secure Identity-Based Matchmaking Encryption from Standard Assumptions
    Lin, Shen
    Li, Yu
    Chen, Jie
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 253 - 273