New techniques for dual system encryption and fully secure HIBE with short ciphertexts

作者: Allison Lewko , Brent Waters

DOI: 10.1007/978-3-642-11799-2_27

关键词:

摘要: We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be in the selective model, under non-static assumption which depended on depth hierarchy. To obtain full security, we apply dual system encryption concept recently introduced by Waters. A straightforward application this technique is insufficient achieve ciphertexts, since original instantiation includes tags that do not compress. overcome challenge, design new method for realizing encryption. provide composite order groups (of three primes) prove security our static assumptions.

参考文章(22)
Elaine Shi, Brent Waters, Delegating Capabilities in Predicate Encryption Systems Automata, Languages and Programming. pp. 560- 578 ,(2008) , 10.1007/978-3-540-70583-3_46
Craig Gentry, Practical Identity-Based Encryption Without Random Oracles Advances in Cryptology - EUROCRYPT 2006. pp. 445- 464 ,(2006) , 10.1007/11761679_27
Craig Gentry, Shai Halevi, Hierarchical Identity Based Encryption with Polynomially Many Levels theory of cryptography conference. pp. 437- 456 ,(2009) , 10.1007/978-3-642-00457-5_26
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5
Jeremy Horwitz, Ben Lynn, Toward Hierarchical Identity-Based Encryption international cryptology conference. pp. 466- 481 ,(2002) , 10.1007/3-540-46035-7_31
Brent Waters, Efficient identity-based encryption without random oracles theory and application of cryptographic techniques. ,vol. 3494, pp. 114- 127 ,(2005) , 10.1007/11426639_7
Jonathan Katz, Amit Sahai, Brent Waters, Predicate encryption supporting disjunctions, polynomial equations, and inner products international cryptology conference. pp. 146- 162 ,(2008) , 10.1007/978-3-540-78967-3_9
Clifford Cocks, An Identity Based Encryption Scheme Based on Quadratic Residues Lecture Notes in Computer Science. pp. 360- 363 ,(2001) , 10.1007/3-540-45325-3_32
Dan Boneh, Eu-Jin Goh, Kobbi Nissim, Evaluating 2-DNF Formulas on Ciphertexts Theory of Cryptography. pp. 325- 341 ,(2005) , 10.1007/978-3-540-30576-7_18