Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness

被引:0
|
作者
Shuai Han
Shengli Liu
Baodong Qin
Dawu Gu
机构
[1] Shanghai Jiao Tong University,Department of Computer Science and Engineering
[2] Southwest University of Science and Technology,School of Computer Science and Technology
[3] State Key Laboratory of Cryptology,undefined
[4] Westone Cryptologic Research Center,undefined
来源
关键词
Tight security reduction; Identity-based encryption; Ciphertext pseudorandomness; CCA2 security; Affine message authentication code; 68P25; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
Affine message authentication code (MAC) and delegatable affine MAC turn out to be useful tools for constructing identity-based encryption (IBE) and hierarchical IBE (HIBE), as shown in Blazy, Kiltz and Pan’s (BKP) creative work in CRYPTO (2014). An important result obtained by BKP is IBE of tight PR-ID-CPA security, i.e., tight IND-ID-CPA security together with ciphertext pseudorandomness (PR). However, the problem of designing tightly PR-ID-CCA2 secure IBE remains open. We note that the CHK transformation does not preserve ciphertext pseudorandomness when converting IND-ID-CPA secure 2-level HIBE to IND-ID-CCA2 secure IBE. In this paper, we solve this problem with a new approach. We introduce a new concept called De-randomized delegatable affine MAC and define for it weak APR-CMA security. We construct such a MAC with a tight security reduction to the Matrix DDH assumption, which includes the k-Linear and DDH assumptions. We present a paradigm for constructing PR-ID-CCA2 secure IBE, which enjoys both ciphertext pseudorandomness and IND-ID-CCA2 security, from De-randomized delegatable affine MAC and Chameleon hashing. The security reduction is tightness preserving. It provides another approach to IND-ID-CCA2 security besides the CHK transformation. By instantiating the paradigm with our specific De-randomized delegatable affine MAC, we obtain the first IBE of tight PR-ID-CCA2 security from the Matrix DDH assumption over pairing groups of prime order. Our IBE also serves as the first tightly IND-ID-CCA2 secure IBE with anonymous recipient (ANON-ID-CCA2) from the Matrix DDH assumption. Our IBE further implies the first tightly IND-ID-CCA2 secure extractable IBE based on the Matrix DDH assumption. The latter can be used to get IBE of simulation-based selective opening CCA2 (SIM-SO-CCA2) security (due to Lai et al. in EUROCRYPT, 2014). The tight security of our IBE leads to a tighter reduction of the SIM-SO-CCA2 security.
引用
收藏
页码:517 / 554
页数:37
相关论文
共 50 条
  • [1] Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
    Han, Shuai
    Liu, Shengli
    Qin, Baodong
    Gu, Dawu
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (03) : 517 - 554
  • [2] CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud
    Sun, Yinxia
    Susilo, Willy
    Zhang, Futai
    Fu, Anmin
    [J]. IEEE ACCESS, 2018, 6 : 56977 - 56983
  • [3] CCA-Secure Deterministic Identity-Based Encryption Scheme
    Huang, Meijuan
    Yang, Bo
    Zhao, Yi
    Liang, Kaitai
    Xue, Liang
    Yang, Xiaoyi
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (03) : 245 - 269
  • [4] Constructions of CCA-Secure Revocable Identity-Based Encryption
    Ishida, Yuu
    Watanabe, Yohei
    Shikata, Junji
    [J]. INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 174 - 191
  • [5] Lattice-Based Cryptoprocessor for CCA-Secure Identity-Based Encryption
    Renteria-Mejia, Claudia P.
    Velasco-Medina, Jaime
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2020, 67 (07) : 2331 - 2344
  • [6] A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme
    Li, Jiguo
    Teng, Meilin
    Zhang, Yichen
    Yu, Qihong
    [J]. COMPUTER JOURNAL, 2016, 59 (07): : 1066 - 1075
  • [7] CCA-Secure Identity-Based Matchmaking Encryption from Standard Assumptions
    Lin, Shen
    Li, Yu
    Chen, Jie
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 253 - 273
  • [8] Improved efficiency for CCA-secure cryptosystems built using identity-based encryption
    Boneh, D
    Katz, J
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2005, PROCEEDINGS, 2005, 3376 : 87 - 103
  • [9] Tightly CCA-Secure Encryption Without Pairings
    Gay, Romain
    Hofheinz, Dennis
    Kiltz, Eike
    Wee, Hoeteck
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I, 2016, 9665 : 1 - 27
  • [10] CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution
    Sun, Yinxia
    Zhang, Futai
    Fu, Anmin
    Xia, Zhe
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2020, 31 (02) : 175 - 191