Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs

被引:1
|
作者
Wang, Xin [1 ,2 ]
Li, Shimin [1 ,2 ]
Xue, Rui [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
来源
INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019) | 2020年 / 11999卷
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Puncturable PRF; Identity-based KEM; HIB-KEM; CONSTRUCTIONS; ENCRYPTION;
D O I
10.1007/978-3-030-41579-2_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we are interested in constructing Puncturable Pseudorandom Functions (PPRFs), a special class of constrained PRFs. While selectively secure PPRFs can be constructed from GGM tree-based PRFs, the adaptive counterpart is tricky to deal with. Inspired by previous works, we investigate on the possibility of directly obtaining adaptively-secure PPRF from Puncturable Identity-based Key Encapsulation Mechanism (PIB-KEM). Our contributions can be summarized as follows: (i) we show that one could derive adaptively-secure PPRFs very naturally originating from PIB-KEM satisfying two necessary conditions. (ii) we define t-puncturable IB-KEM (t-PIBKEM) and show its existence by an efficient conversion basing on Hierarchical IB-KEM (HIBKEM). Furthermore, we demonstrate its application to constructing t-puncturable PRFs, a generalized notion of PPRFs.
引用
收藏
页码:463 / 481
页数:19
相关论文
共 50 条
  • [41] Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption
    Lu, Yang
    Li, Jiguo
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 199 - 202
  • [42] Secure mobile communication via identity-based cryptography and server-aided computations
    Matthew Smith
    Christian Schridde
    Björn Agel
    Bernd Freisleben
    The Journal of Supercomputing, 2011, 55 : 284 - 306
  • [43] Fully secure fuzzy identity-based encryption for secure IoT communications
    Mao, Yijun
    Li, Jin
    Chen, Min-Rong
    Liu, Jianan
    Xie, Congge
    Zhan, Yiju
    COMPUTER STANDARDS & INTERFACES, 2016, 44 : 117 - 121
  • [44] Secure mobile communication via identity-based cryptography and server-aided computations
    Smith, Matthew
    Schridde, Christian
    Agel, Bjoern
    Freisleben, Bernd
    JOURNAL OF SUPERCOMPUTING, 2011, 55 (02): : 284 - 306
  • [45] Flexible and Secure Communications in an Identity-Based Coalition Environment
    Boklan, Kent D.
    Klagsbrun, Zev
    Paterson, Kenneth G.
    Srinivasan, Sriramkrishnan
    2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 1126 - +
  • [46] Secure universal designated verifier identity-based signcryption
    Lin, Changlu
    Tang, Fei
    Ke, Pinhui
    Harn, Lein
    Zhang, Shengyuan
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (02) : 434 - 444
  • [47] Forward Secure Identity-Based Signature Scheme with RSA
    Ko, Hankyung
    Jeong, Gweonho
    Kim, Jongho
    Kim, Jihye
    Oh, Hyunok
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 : 314 - 327
  • [48] A Secure Email Encryption Proxy Based on Identity-based Cryptography
    Chen, Tieming
    Ma, Shilong
    2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 284 - 286
  • [49] Secure Symmetric Key Fuzzy Identity-Based Encryption
    Liu, Pengtao
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2665 - 2668
  • [50] Identity-Based Secure Distributed Data Storage Schemes
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (04) : 941 - 953