Identity Based Encryption Without Redundancy

作者: Benoît Libert , Jean-Jacques Quisquater

DOI: 10.1007/11496137_20

关键词:

摘要: This paper presents a first example of secure identity based encryption scheme (IBE) without redundancy in the sense Phan and Pointcheval. modification Boneh-Franklin IBE is an hybrid construction that proved to be (using proof techniques borrowed from those for KEM-DEM constructions) random oracle model under slightly stronger assumption than original turns out more efficient at decryption latter. A second contribution this work show how shorten ciphertexts recently proposed multiple-recipient scheme. Our latter spares about 1180 bits bandwidth point view as, somewhat surprisingly, redundancies are not needed although all elements ciphertext space reachable by mapping. shows public key schemes, may useless even when mapping surjection.

参考文章(60)
Aggelos Kiayias, Moti Yung, Self Protecting Pirates and Black-Box Traitor Tracing international cryptology conference. pp. 63- 79 ,(2001) , 10.1007/3-540-44647-8_4
Sattam S. Al-Riyami, Kenneth G. Paterson, CBE from CL-PKE: A Generic Construction and Efficient Schemes Public Key Cryptography - PKC 2005. pp. 398- 415 ,(2005) , 10.1007/978-3-540-30580-4_27
M. Bellare, Optimal Asymmetric Encryption-How to Encrypt with RSA theory and application of cryptographic techniques. ,(1995)
Aggelos Kiayias, Moti Yung, Polynomial reconstruction based cryptography selected areas in cryptography. pp. 129- 133 ,(2001) , 10.1007/3-540-45537-X_10
Yang Cui, Kazukuni Kobara, Hideki Imai, A Generic Conversion with Optimal Redundancy Lecture Notes in Computer Science. pp. 104- 117 ,(2005) , 10.1007/978-3-540-30574-3_9
Duong Hieu Phan, David Pointcheval, OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding international conference on the theory and application of cryptology and information security. pp. 63- 77 ,(2004) , 10.1007/978-3-540-30539-2_5
Shai Halevi, Phillip Rogaway, A parallelizable enciphering mode the cryptographers’ track at the rsa conference. pp. 292- 304 ,(2004) , 10.1007/978-3-540-24660-2_23
Kaoru Kurosawa, Toshihiko Matsuo, How to remove MAC from DHIES australasian conference on information security and privacy. pp. 236- 247 ,(2004) , 10.1007/978-3-540-27800-9_21
Mihir Bellare, Phillip Rogaway, Optimal asymmetric encryption theory and application of cryptographic techniques. pp. 92- 111 ,(1994) , 10.1007/BFB0053428
Coron Jean-Sébastien, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen, GEM: A Generic Chosen-Ciphertext Secure Encryption Method the cryptographers track at the rsa conference. pp. 263- 276 ,(2002) , 10.1007/3-540-45760-7_18