Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs

被引:1
|
作者
Wang, Xin [1 ,2 ]
Li, Shimin [1 ,2 ]
Xue, Rui [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
来源
INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019) | 2020年 / 11999卷
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Puncturable PRF; Identity-based KEM; HIB-KEM; CONSTRUCTIONS; ENCRYPTION;
D O I
10.1007/978-3-030-41579-2_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we are interested in constructing Puncturable Pseudorandom Functions (PPRFs), a special class of constrained PRFs. While selectively secure PPRFs can be constructed from GGM tree-based PRFs, the adaptive counterpart is tricky to deal with. Inspired by previous works, we investigate on the possibility of directly obtaining adaptively-secure PPRF from Puncturable Identity-based Key Encapsulation Mechanism (PIB-KEM). Our contributions can be summarized as follows: (i) we show that one could derive adaptively-secure PPRFs very naturally originating from PIB-KEM satisfying two necessary conditions. (ii) we define t-puncturable IB-KEM (t-PIBKEM) and show its existence by an efficient conversion basing on Hierarchical IB-KEM (HIBKEM). Furthermore, we demonstrate its application to constructing t-puncturable PRFs, a generalized notion of PPRFs.
引用
收藏
页码:463 / 481
页数:19
相关论文
共 50 条
  • [21] Puncturable Attribute-Based Encryption for Secure Data Delivery in Internet of Things
    Tran Viet Xuan Phuong
    Ning, Rui
    Xin, Chunsheng
    Wu, Hongyi
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1511 - 1519
  • [22] Adaptively Secure Identity-Based Identification from Lattices without Random Oracles
    Rueckert, Markus
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 345 - 362
  • [23] Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext
    Kim, Jongkil
    Susilo, Willy
    Au, Man Ho
    Seberry, Jennifer
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 679 - 693
  • [24] Adaptively Secure Identity-based Threshold Broadcast Encryption without Random Oracles
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    SMART MATERIALS AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2011, 143-144 : 347 - +
  • [25] Identity-Based Identification Schemes from ID-KEMs
    Barapatre, Prateek
    Rangan, Chandrasekaran Pandu
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2013, 2013, 8204 : 111 - 129
  • [26] Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters
    Yamada, Shota
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 32 - 62
  • [27] Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors
    Fan, Jingjing
    Lu, Xingye
    Au, Man Ho
    INFORMATION SECURITY AND PRIVACY, ACISP 2023, 2023, 13915 : 320 - 340
  • [28] Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 12 - 18
  • [29] Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service
    Chen, Liqing
    Li, Jiguo
    Zhang, Yichen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (03): : 1523 - 1545
  • [30] Tightly Secure Identity-Based Multisignatures
    Yanai, Naoto
    2017 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2017,