Direct chosen ciphertext security from identity-based techniques

作者: Xavier Boyen , Qixiang Mei , Brent Waters

DOI: 10.1145/1102120.1102162

关键词:

摘要: We describe a new encryption technique that is secure in the standard model against chosen ciphertext attacks. base our method on two very efficient Identity-Based Encryption (IBE) schemes without random oracles due to Boneh and Boyen, Waters.Unlike previous CCA2-secure cryptosystems use IBE as black box, approach simple compact. It makes direct of underlying structure, requires no cryptographic primitive other than scheme itself. This conveys several advantages. achieve shorter size best known instantiations methods, Katz (and more so Canetti, Halevi, Katz). Further, operates nicely hierarchical IBE, since it allows validity ciphertexts be checked publicly, can used construct systems with non-interactive threshold decryption.In this paper we main constructions: full system based Waters adaptive-ID KEM Boneh-Boyen selective-ID IBE. Both are shown model, latter tight reduction. discuss uses extensions approach, draw comparisons provably model.

参考文章(30)
Leslie Lamport, Constructing Digital Signatures from a One Way Function SRI International. ,(2016)
Victor Shoup, Rosario Gennaro, Securing Threshold Cryptosystems against Chosen Ciphertext Attack Journal of Cryptology. ,vol. 15, pp. 75- 96 ,(2002) , 10.1007/S00145-001-0020-9
Dan Boneh, Jonathan Katz, Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption Lecture Notes in Computer Science. pp. 87- 103 ,(2005) , 10.1007/978-3-540-30574-3_8
Victor Shoup, Using hash functions as a hedge against chosen ciphertext attack theory and application of cryptographic techniques. pp. 275- 288 ,(2000) , 10.1007/3-540-45539-6_19
Paulo S. L. M. Barreto, Michael Naehrig, Pairing-Friendly elliptic curves of prime order international conference on selected areas in cryptography. ,vol. 3897, pp. 319- 331 ,(2005) , 10.1007/11693383_22
Ran Canetti, Shafi Goldwasser, An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack theory and application of cryptographic techniques. pp. 90- 106 ,(1999)
Jeremy Horwitz, Ben Lynn, Toward Hierarchical Identity-Based Encryption international cryptology conference. pp. 466- 481 ,(2002) , 10.1007/3-540-46035-7_31
Charles Rackoff, Daniel R. Simon, Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack international cryptology conference. pp. 433- 444 ,(1991) , 10.1007/3-540-46766-1_35
Brent Waters, Efficient identity-based encryption without random oracles theory and application of cryptographic techniques. ,vol. 3494, pp. 114- 127 ,(2005) , 10.1007/11426639_7
Kaoru Kurosawa, Yvo Desmedt, A New Paradigm of Hybrid Encryption Scheme Advances in Cryptology – CRYPTO 2004. ,vol. 3152, pp. 426- 442 ,(2004) , 10.1007/978-3-540-28628-8_26