Efficient (Anonymous) Compact HIBE from Standard Assumptions

被引:0
|
作者
Ramanna, Somindu C. [1 ]
Sarkar, Palash [1 ]
机构
[1] Indian Stat Inst, Appl Stat Unit, Kolkata, India
来源
关键词
constant-size ciphertext HIBE; asymmetric pairings; standard assumptions; dual-system encryption; IDENTITY-BASED ENCRYPTION; DUAL SYSTEM ENCRYPTION; SIZE CIPHERTEXT HIBE; IBE; CONSTRUCTIONS; PAIRINGS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present two hierarchical identity-based encryption (HIBE) schemes, denoted as H-1 and H-2, from Type-3 pairings with constant sized ciphertexts. Scheme H-1 achieves anonymity while H-2 is non-anonymous. The constructions are obtained by extending the IBE scheme recently proposed by Jutla and Roy (Asiacrypt 2013). Security is based on the standard decisional Symmetric eXternal Diffie-Hellman (SXDH) assumption. In terms of provable security properties, previous direct constructions of constant-size ciphertext HIBE had one or more of the following drawbacks: security in the weaker model of selective-identity attacks; exponential security degradation in the depth of the HIBE; and use of non-standard assumptions. The security arguments for H-1 and H-2 avoid all of these drawbacks. Based on the current state-of-the-art, H-1 and H-2 are the schemes of choice for efficient implementation of (anonymous) HIBE constructions.
引用
收藏
页码:243 / 258
页数:16
相关论文
共 50 条
  • [1] Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    Xian, He-Qun
    [J]. COMPUTER JOURNAL, 2019, 62 (08): : 1087 - 1091
  • [2] Anonymous HIBE: Compact Construction Over Prime-Order Groups
    Park, Jong Hwan
    Lee, Dong Hoon
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (04) : 2531 - 2541
  • [3] Compact NIZKs from Standard Assumptions on Bilinear Maps
    Katsumata, Shuichi
    Nishimaki, Ryo
    Yamada, Shota
    Yamakawa, Takashi
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT III, 2020, 12107 : 379 - 409
  • [4] Anonymity from Asymmetry: New Constructions for Anonymous HIBE
    Ducas, Leo
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 148 - 164
  • [5] Compact NIZKs from Standard Assumptions on Bilinear Maps
    Katsumata, Shuichi
    Nishimaki, Ryo
    Yamada, Shota
    Yamakawa, Takashi
    [J]. JOURNAL OF CRYPTOLOGY, 2024, 37 (03)
  • [6] Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model
    Wang, Xu An
    Yang, Xiaoyuan
    Zhang, Minqing
    [J]. FUNDAMENTA INFORMATICAE, 2011, 109 (02) : 189 - 200
  • [7] Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters
    Singh, Kunwar
    Rangan, C. Pandu
    Banerjee, A. K.
    [J]. INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 542 - 553
  • [8] Efficient Public Trace and Revoke from Standard Assumptions
    Agrawal, Shweta
    Bhattacherjee, Sanjay
    Duong Hieu Phan
    Stehle, Damien
    Yamada, Shota
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2277 - 2293
  • [9] Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts
    De Caro, Angelo
    Iovino, Vincenzo
    Persiano, Giuseppe
    [J]. PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010, 2010, 6487 : 347 - 366
  • [10] Efficient Polynomial Delegation Under Standard Assumptions
    Morillo, Paz
    Obrador, Marc
    [J]. 2013 ELEVENTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2013, : 301 - 308