Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs

被引:1
|
作者
Wang, Xin [1 ,2 ]
Li, Shimin [1 ,2 ]
Xue, Rui [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
来源
INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019) | 2020年 / 11999卷
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Puncturable PRF; Identity-based KEM; HIB-KEM; CONSTRUCTIONS; ENCRYPTION;
D O I
10.1007/978-3-030-41579-2_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we are interested in constructing Puncturable Pseudorandom Functions (PPRFs), a special class of constrained PRFs. While selectively secure PPRFs can be constructed from GGM tree-based PRFs, the adaptive counterpart is tricky to deal with. Inspired by previous works, we investigate on the possibility of directly obtaining adaptively-secure PPRF from Puncturable Identity-based Key Encapsulation Mechanism (PIB-KEM). Our contributions can be summarized as follows: (i) we show that one could derive adaptively-secure PPRFs very naturally originating from PIB-KEM satisfying two necessary conditions. (ii) we define t-puncturable IB-KEM (t-PIBKEM) and show its existence by an efficient conversion basing on Hierarchical IB-KEM (HIBKEM). Furthermore, we demonstrate its application to constructing t-puncturable PRFs, a generalized notion of PPRFs.
引用
收藏
页码:463 / 481
页数:19
相关论文
共 50 条
  • [1] Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
    Hohenberger, Susan
    Koppula, Venkata
    Waters, Brent
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 79 - 102
  • [2] Identity-based puncturable signature scheme
    Yang D.
    Chen Y.
    Wei J.
    Hu X.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (12): : 17 - 26
  • [3] Puncturable Identity-Based Encryption from Lattices
    Dutta, Priyanka
    Susilo, Willy
    Duong, Dung Hoang
    Roy, Partha Sarathi
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 571 - 589
  • [4] Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails
    Wei, Jianghong
    Chen, Xiaofeng
    Wang, Jianfeng
    Hu, Xuexian
    Ma, Jianfeng
    COMPUTER SECURITY - ESORICS 2019, PT II, 2019, 11736 : 134 - 150
  • [5] Burn After Reading: Adaptively Secure Puncturable Identity-Based Proxy Re-Encryption Scheme for Securing Group Message
    Xiong, Hu
    Wang, Lili
    Zhou, Zhida
    Zhao, Zetong
    Huang, Xin
    Kumari, Saru
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (13) : 11248 - 11260
  • [6] Compact Identity-Based Signature and Puncturable Signature from SQISign
    Shaw, Surbhi
    Dutta, Ratna
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2023, PT I, 2024, 14561 : 282 - 305
  • [7] Puncturable identity-based and attribute-based encryption from lattices
    Dutta, Priyanka
    Susilo, Willy
    Dung Hoang Duong
    Roy, Partha Sarathi
    THEORETICAL COMPUTER SCIENCE, 2022, 929 : 18 - 38
  • [8] Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security
    Dutta, Priyanka
    Jiang, Mei
    Dung Hoang Duong
    Susilo, Willy
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 408 - 422
  • [9] Provably Secure Authentication Protocol for Mobile Clients in IoT Environment Using Puncturable Pseudorandom Function
    Saleem, Muhammad Asad
    Ghaffar, Zahid
    Mahmood, Khalid
    Das, Ashok Kumar
    Rodrigues, Joel J. P. C.
    Khan, Muhammad Khurram
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (22) : 16613 - 16622
  • [10] Adaptively Secure Constrained Pseudorandom Functions
    Hofheinz, Dennis
    Kamath, Akshay
    Koppula, Venkata
    Waters, Brent
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2019, 2019, 11598 : 357 - 376