Efficient hybrid encryption from ID-based encryption

被引:0
|
作者
Masayuki Abe
Yang Cui
Hideki Imai
Eike Kiltz
机构
[1] NTT,Information Sharing Platform Laboratories
[2] AIST,Research Center for Information Security (RCIS)
[3] Chuo University,undefined
[4] CWI Amsterdam,undefined
来源
关键词
Hybrid Encryption; Selective-ID; KEM; Threshold PKE; Chameleon hash; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
This paper deals with generic transformations from ID-based key encapsulation mechanisms (IBKEM) to hybrid public-key encryption (PKE). The best generic transformation known until now is by Boneh and Katz and requires roughly 704-bit overhead in the ciphertext. We present new generic transformations that are applicable to partitioned IBKEMs. A partitioned IBKEM is an IBKEM that provides some extra structure. Such IBKEMs are quite natural and in fact nearly all known IBKEMs have this additional property. Our first transformation yields chosen-ciphertext secure PKE schemes from selective-ID secure partitioned IBKEMs with a 256-bit overhead in ciphertext size plus one extra exponentiation in encryption/decryption. As the central tool a Chameleon Hash function is used to map the identities. We also propose other methods to remove the use of Chameleon Hash, which may be of independent technical interest. Applying our transformations to existing IBKEMs we propose a number of novel PKE schemes with different trade-offs. In some concrete instantiations the Chameleon Hash can be made “implicit” which results in improved efficiency by eliminating the additional exponentiation. Since our transformations preserve the public verifiability property of the IBE schemes it is possible to extend our results to build threshold hybrid PKE schemes. We show an analogue generic transformation in the threshold setting and present a concrete scheme which results in the most efficient threshold PKE scheme in the standard model.
引用
收藏
页码:205 / 240
页数:35
相关论文
共 50 条
  • [1] Efficient hybrid encryption from ID-based encryption
    Abe, Masayuki
    Cui, Yang
    Imai, Hideki
    Kiltz, Eike
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2010, 54 (03) : 205 - 240
  • [2] Constructing Certificate less Encryption and ID-Based Encryption from ID-Based Key Agreement
    Fiore, Dario
    Gennaro, Rosario
    Smart, Nigel P.
    [J]. PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010, 2010, 6487 : 167 - +
  • [3] Efficient Revocable ID-Based Encryption with a Public Channel
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    [J]. COMPUTER JOURNAL, 2012, 55 (04): : 475 - 486
  • [4] Efficient searchable ID-based encryption with a designated server
    Wu, Tsu-Yang
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    [J]. ANNALS OF TELECOMMUNICATIONS, 2014, 69 (7-8) : 391 - 402
  • [5] Efficient searchable ID-based encryption with a designated server
    Tsu-Yang Wu
    Tung-Tso Tsai
    Yuh-Min Tseng
    [J]. annals of telecommunications - annales des télécommunications, 2014, 69 : 391 - 402
  • [6] Efficient ID-based broadcast encryption scheme - Comments
    Chien, Hung-Yu
    [J]. IEEE TRANSACTIONS ON BROADCASTING, 2007, 53 (04) : 809 - 810
  • [7] A Remark on "Efficient Revocable ID-Based Encryption with a Public Channel"
    Seo, Jae Hong
    Emura, Keita
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (11) : 2282 - 2285
  • [8] ID-based Encryption Scheme with Revocation
    Othman, Hafizul Azrie
    Ismail, Eddie Shahril
    [J]. 4TH INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES (ICMS4): MATHEMATICAL SCIENCES: CHAMPIONING THE WAY IN A PROBLEM BASED AND DATA DRIVEN SOCIETY, 2017, 1830
  • [9] Efficient revocable ID-based encryption with cloud revocation server
    Jia, Xiaoying
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    He, Debiao
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (01)
  • [10] ID-based ring authenticated encryption
    Cao, TJ
    Lin, DD
    Xue, R
    [J]. 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS: AINA 2005, 2005, : 591 - 596