Direct chosen-ciphertext secure hierarchical ID-Based encryption schemes

被引:0
|
作者
Park, Jong Hwan [1 ]
Lee, Dong Hoon [1 ]
机构
[1] Korea Univ, CIST, Seoul 136701, South Korea
来源
关键词
Hierarchical Identity Based Encryption; chosen ciphertext security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We describe two Hierarchical Identity Based Encryption (HIBE) schemes which are selective-ID chosen ciphertext secure. Our constructions are based on the Boneh-Boyen and the Boneh-Boyen-Goh HIBE schemes respectively. We apply the signature-based method to their HIBE schemes. The proposed I-level HIBE schemes are directly derived from l-level HIBE schemes secure against chosen plaintext attacks without padding on identities with one-bit. This is more compact than the known generic transformation suggested by Canetti et al..
引用
收藏
页码:94 / +
页数:3
相关论文
共 50 条
  • [41] Chosen-ciphertext security from identity-based encryption
    Boneh, Dan
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    [J]. SIAM JOURNAL ON COMPUTING, 2006, 36 (05) : 1301 - 1328
  • [42] Efficient chosen-ciphertext secure hybrid encryption scheme tolerating continuous leakage attacks
    Zhou, Yanwei
    Yang, Bo
    Yu, Yong
    Khan, Arshad
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2019, 42 (01) : 39 - 47
  • [44] Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
    Wang, Huige
    Chen, Kefei
    Liu, Joseph K.
    Hu, Ziyuan
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE (ISPEC 2018), 2018, 11125 : 119 - 140
  • [45] Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman
    Galindo, David
    [J]. PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010, 2010, 6487 : 367 - 376
  • [46] Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
    Guo, Lifeng
    Hu, Lei
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 63 (01) : 151 - 157
  • [47] Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    [J]. THEORETICAL COMPUTER SCIENCE, 2012, 462 : 39 - 58
  • [48] Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
    He, Kai
    Weng, Jian
    Liu, Jia-Nan
    Liu, Joseph K.
    Liu, Wei
    Deng, Robert H.
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 247 - 255
  • [49] Secure Proxy Re-Encryption Protocol for FANETs Resistant to Chosen-Ciphertext Attacks
    Park, Hyun-A
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (02):
  • [50] Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
    Kiltz, Eike
    Galindo, David
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 336 - 347