Efficient (Anonymous) Compact HIBE from Standard Assumptions

被引:0
|
作者
Ramanna, Somindu C. [1 ]
Sarkar, Palash [1 ]
机构
[1] Indian Stat Inst, Appl Stat Unit, Kolkata, India
来源
关键词
constant-size ciphertext HIBE; asymmetric pairings; standard assumptions; dual-system encryption; IDENTITY-BASED ENCRYPTION; DUAL SYSTEM ENCRYPTION; SIZE CIPHERTEXT HIBE; IBE; CONSTRUCTIONS; PAIRINGS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present two hierarchical identity-based encryption (HIBE) schemes, denoted as H-1 and H-2, from Type-3 pairings with constant sized ciphertexts. Scheme H-1 achieves anonymity while H-2 is non-anonymous. The constructions are obtained by extending the IBE scheme recently proposed by Jutla and Roy (Asiacrypt 2013). Security is based on the standard decisional Symmetric eXternal Diffie-Hellman (SXDH) assumption. In terms of provable security properties, previous direct constructions of constant-size ciphertext HIBE had one or more of the following drawbacks: security in the weaker model of selective-identity attacks; exponential security degradation in the depth of the HIBE; and use of non-standard assumptions. The security arguments for H-1 and H-2 avoid all of these drawbacks. Based on the current state-of-the-art, H-1 and H-2 are the schemes of choice for efficient implementation of (anonymous) HIBE constructions.
引用
收藏
页码:243 / 258
页数:16
相关论文
共 50 条
  • [21] Verifiable Random Functions from Standard Assumptions
    Hofheinz, Dennis
    Jager, Tibor
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT I, 2016, 9562 : 336 - 362
  • [22] Secure Software Leasing from Standard Assumptions
    Kitagawa, Fuyuki
    Nishimaki, Ryo
    Yamakawa, Takashi
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2021, PT I, 2021, 13042 : 31 - 61
  • [23] Limits of Provable Security From Standard Assumptions
    Pass, Rafael
    [J]. STOC 11: PROCEEDINGS OF THE 43RD ACM SYMPOSIUM ON THEORY OF COMPUTING, 2011, : 109 - 118
  • [24] Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
    Libert, Benoit
    Paterson, Kenneth G.
    Quaglia, Elizabeth A.
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 206 - 224
  • [25] Efficient identity-based encryption with Hierarchical key-insulation from HIBE
    Emura, Keita
    Takayasu, Atsushi
    Watanabe, Yohei
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (10) : 2397 - 2431
  • [26] Watermarkable Public Key Encryption with Efficient Extraction Under Standard Assumptions
    Baldimtsi, Foteini
    Kiayias, Aggelos
    Samari, Katerina
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 244 - 267
  • [27] Exploring Constructions of Compact NIZKs from Various Assumptions
    Katsumata, Shuichi
    Nishimaki, Ryo
    Yamada, Shota
    Yamakawa, Takashi
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 639 - 669
  • [28] Compact IBBE and Fuzzy IBE from Simple Assumptions
    Gong, Junqing
    Libert, Benoit
    Ramanna, Somindu C.
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 563 - 582
  • [29] Efficient identity-based encryption with Hierarchical key-insulation from HIBE
    Keita Emura
    Atsushi Takayasu
    Yohei Watanabe
    [J]. Designs, Codes and Cryptography, 2021, 89 : 2397 - 2431
  • [30] Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 619 - 636