Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited

被引:0
|
作者
Chen, Yu [2 ]
Huang, Qiong [3 ]
Zhang, Zongyang [1 ,4 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur SKLOIS, Beijing 100864, Peoples R China
[3] South China Agr Univ, Coll Informat, Guangzhou, Peoples R China
[4] Shanghai Jiao Tong Univ, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
ENCRYPTION; SECURITY;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Identity-based non-interactive key exchange (IB-NIKE) is a powerful but a bit overlooked primitive in identity-based cryptography. While identity-based encryption and signature have been extensively investigated over the past three decades, IB-NIKE has remained largely unstudied. Currently, there are only few IB-NIKE schemes in the literature. Among them, Sakai-Ohgishi-Kasahara (SOK) scheme is the first efficient and secure IB-NIKE scheme, which has great influence on follow-up works. However, the SOK scheme required its identity mapping function to be modeled as a random oracle to prove security. Moreover, the existing security proof heavily relies on the ability of programming the random oracle. It is unknown whether such reliance is inherent. In this work, we intensively revisit the SOK IB-NIKE scheme, and present a series of possible and impossible results in the random oracle model and the standard model. In the random oracle model, we first improve previous security analysis for the SOK IB-NIKE scheme by giving a tighter reduction. We then use meta-reduction technique to show that the SOK scheme is unlikely proven to be secure based on the computational bilinear Diffie-Hellman (CBDH) assumption without programming the random oracle. In the standard model, we show how to instantiate the random oracle in the SOK scheme with a concrete hash function from admissible hash functions (AHFs) and indistinguishability obfuscation. The resulting scheme is fully adaptive-secure based on the decisional bilinear Diffie-Hellman inversion (DBDHI) assumption. To the best of our knowledge, this is first fully adaptive-secure IB-NIKE scheme in the standard model that does not explicitly require multilinear maps. Previous schemes in the standard model either have merely selective security or use multilinear maps as a key ingredient. Of particular interest, we generalize the definition of AHFs, and propose a generic construction which enables AHFs with previously unachieved parameters.
引用
收藏
页码:274 / 289
页数:16
相关论文
共 50 条
  • [1] Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange revisited and more
    Chen, Yu
    Huang, Qiong
    Zhang, Zongyang
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (01) : 15 - 33
  • [2] Sakai–Ohgishi–Kasahara identity-based non-interactive key exchange revisited and more
    Yu Chen
    Qiong Huang
    Zongyang Zhang
    [J]. International Journal of Information Security, 2016, 15 : 15 - 33
  • [3] Non-Interactive Key Exchange from Identity-Based Encryption
    Blazy, Olivier
    Chevalier, Celine
    [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [4] Anonymous Key Issuing Protocol for Distributed Sakai-Kasahara Identity-based Scheme
    Siad, Amar
    Amara, Moncef
    [J]. PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON NETWORKS (ICN 2011), 2011, : 35 - 40
  • [5] Security proof of Sakai-Kasahara's identity-based encryption scheme
    Chen, LQ
    Cheng, ZH
    [J]. CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2005, 3796 : 442 - 459
  • [6] A Remark on an Identity-Based Encryption Scheme with Non-interactive Opening
    Sakai, Yusuke
    Hanaoka, Goichiro
    [J]. PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 703 - 706
  • [7] Identity-based non-interactive key distribution with forward security
    Steinwandt, Rainer
    Suarez Corona, Adriana
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2012, 64 (1-2) : 195 - 208
  • [8] Identity-based non-interactive key distribution with forward security
    Rainer Steinwandt
    Adriana Suárez Corona
    [J]. Designs, Codes and Cryptography, 2012, 64 : 195 - 208
  • [9] Comment on “Identity-based non-interactive key distribution with forward security”
    Xi Jun Lin
    Ran Ren
    Zhengang Wei
    Lin Sun
    [J]. Designs, Codes and Cryptography, 2015, 75 : 1 - 7
  • [10] Non-interactive Identity-Based DNF Signature Scheme and Its Extensions
    Lee, Kwangsu
    Hwang, Jung Yeon
    Lee, Dong Hoon
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 166 - 183