FORWARD -SECURE IDENTITY -BASED ENCRYPTION WITH DIRECT CHOSEN-CIPHERTEXT SECURITY IN THE STANDARD MODEL

被引:3
|
作者
Lu, Yang [1 ]
Li, Jiguo [1 ]
机构
[1] Hohai Univ, Coll Comp & Informat, 8 Focheng Xi Rd, Nanjing 211100, Jiangsu, Peoples R China
关键词
Identity-based encryption; key exposure; forward security; chosenciphertext security; standard model; KEY-INSULATED SIGNATURE;
D O I
10.3934/amc.2017010
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The paradigm of forward security provides a promising approach to deal with the key exposure problem as it can effectively minimize the damage caused by the key exposure. In this paper, we develop a new forward -secure identity -based encryption scheme without random oracles. We formally prove that the proposed scheme is secure against adaptive chosen-ciphertext attacks in the standard model. In the proposed scheme, the running time of the private key extraction and decryption algorithms and the sizes of the user's initial private key and the ciphertext are independent on the total number of time periods, and any other performance parameter has at most log -squared complexity in terms of the total number of time periods. Compared with the previous forward -secure identity -based encryption schemes, the proposed scheme enjoys obvious advantage in the overall performance. To the best of our knowledge, it is the first forward -secure identity -based encryption scheme that achieves direct chosen-ciphertext security in the standard model.
引用
收藏
页码:161 / 177
页数:17
相关论文
共 50 条
  • [1] Chosen-ciphertext security from identity-based encryption
    Canetti, R
    Halevi, S
    Katz, J
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 207 - 222
  • [2] Chosen-ciphertext security from identity-based encryption
    Boneh, Dan
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    [J]. SIAM JOURNAL ON COMPUTING, 2006, 36 (05) : 1301 - 1328
  • [3] A CHOSEN-CIPHERTEXT SECURE IDENTITY-BASED BROADCAST ENCRYPTION SCHEME
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 3556 - +
  • [4] Efficient chosen-ciphertext secure identity-based encryption with wildcards
    Birkett, James
    Dent, Alexander W.
    Neven, Gregory
    Schuldt, Jacob C. N.
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 274 - +
  • [5] Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
    He, Kai
    Weng, Jian
    Liu, Jia-Nan
    Liu, Joseph K.
    Liu, Wei
    Deng, Robert H.
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 247 - 255
  • [6] Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    Li, Yan
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (01) : 35 - 50
  • [7] On Homomorphic Encryption and Chosen-Ciphertext Security
    Hemenway, Brett
    Ostrovsky, Rafail
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 52 - 65
  • [8] Chosen ciphertext secure identity-based broadcast encryption in the standard model
    Sun J.
    Hu Y.-P.
    Zhang L.-Y.
    [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16 (06) : 672 - 676
  • [9] Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model
    孙瑾
    胡予濮
    张乐友
    [J]. Journal of Shanghai Jiaotong University(Science), 2011, 16 (06) : 672 - 676
  • [10] Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption
    Weiran Liu
    Jianwei Liu
    Qianhong Wu
    Bo Qin
    Yan Li
    [J]. International Journal of Information Security, 2016, 15 : 35 - 50