Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs

被引:1
|
作者
Wang, Xin [1 ,2 ]
Li, Shimin [1 ,2 ]
Xue, Rui [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
来源
INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019) | 2020年 / 11999卷
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Puncturable PRF; Identity-based KEM; HIB-KEM; CONSTRUCTIONS; ENCRYPTION;
D O I
10.1007/978-3-030-41579-2_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we are interested in constructing Puncturable Pseudorandom Functions (PPRFs), a special class of constrained PRFs. While selectively secure PPRFs can be constructed from GGM tree-based PRFs, the adaptive counterpart is tricky to deal with. Inspired by previous works, we investigate on the possibility of directly obtaining adaptively-secure PPRF from Puncturable Identity-based Key Encapsulation Mechanism (PIB-KEM). Our contributions can be summarized as follows: (i) we show that one could derive adaptively-secure PPRFs very naturally originating from PIB-KEM satisfying two necessary conditions. (ii) we define t-puncturable IB-KEM (t-PIBKEM) and show its existence by an efficient conversion basing on Hierarchical IB-KEM (HIBKEM). Furthermore, we demonstrate its application to constructing t-puncturable PRFs, a generalized notion of PPRFs.
引用
收藏
页码:463 / 481
页数:19
相关论文
共 50 条
  • [31] Secure and practical identity-based encryption
    Naccache, D.
    IET INFORMATION SECURITY, 2007, 1 (02) : 59 - 64
  • [32] A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography
    Ao, Weijun
    Fu, Shaojing
    Zhang, Chao
    Huang, Yuzhou
    Xia, Fei
    2019 IEEE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY (CCET), 2019, : 90 - 95
  • [33] Secure AIS with Identity-Based Authentication and Encryption
    Goudosis, A.
    Katsikas, S. K.
    TRANSNAV-INTERNATIONAL JOURNAL ON MARINE NAVIGATION AND SAFETY OF SEA TRANSPORTATION, 2020, 14 (02) : 287 - 298
  • [34] Tightly Secure Hierarchical Identity-Based Encryption
    Roman Langrehr
    Jiaxin Pan
    Journal of Cryptology, 2020, 33 : 1787 - 1821
  • [35] Secure identity-based signcryption in the standard model
    Li, Fagen
    Takagi, Tsuyoshi
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (11-12) : 2685 - 2694
  • [36] Secure Identity-Based Key Establishment Protocol
    Pal, Om
    Saxena, Anupam
    Saquib, Zia
    Menezes, Bernard L.
    COMPUTER NETWORKS AND INFORMATION TECHNOLOGIES, 2011, 142 : 618 - +
  • [37] An identity-based secure VANET communication system
    Naresh, Vankamamidi S.
    Reddi, Sivaranjani
    SECURITY AND PRIVACY, 2024, 7 (02)
  • [38] On use of identity-based encryption for secure emailing
    Veigner, Christian
    Rong, Chunming
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 289 - +
  • [39] Tightly Secure Hierarchical Identity-Based Encryption
    Langrehr, Roman
    Pan, Jiaxin
    JOURNAL OF CRYPTOLOGY, 2020, 33 (04) : 1787 - 1821
  • [40] Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting
    Dutta, Subhranil
    Pal, Tapas
    Dutta, Ratna
    THEORETICAL COMPUTER SCIENCE, 2024, 995