Efficient CCA-Secure PKE from Identity-Based Techniques

Boneh, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure public key encryption (PKE) from any selective-ID CPA-secure identity-based encryption (IBE) schemes. Their approach treated IBE as a black box. Subsequently, Boyen, Mei, and Waters demonstrated how to build a direc...

Full description

Saved in:
Bibliographic Details
Main Authors: LAI, Junzuo, DENG, Robert H., LIU, Shengli, KOU, Weidong
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2010
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/634
https://ink.library.smu.edu.sg/context/sis_research/article/1633/viewcontent/Lai2010_Chapter_EfficientCCA_SecurePKEFromIden.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-1633
record_format dspace
spelling sg-smu-ink.sis_research-16332020-07-22T07:28:49Z Efficient CCA-Secure PKE from Identity-Based Techniques LAI, Junzuo DENG, Robert H. LIU, Shengli KOU, Weidong Boneh, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure public key encryption (PKE) from any selective-ID CPA-secure identity-based encryption (IBE) schemes. Their approach treated IBE as a black box. Subsequently, Boyen, Mei, and Waters demonstrated how to build a direct CCA-secure PKE scheme from the Waters IBE scheme, which is adaptive-ID CPA secure. They made direct use of the underlying IBE structure, and required no cryptographic primitive other than the IBE scheme itself. However, their scheme requires long public key and the security reduction is loose. In this paper, we propose an efficient PKE scheme employing identity-based techniques. Our scheme requires short public key and is proven CCA-secure in the standard model (without random oracles) with a tight security reduction, under the Decisional Bilinear Diffie-Hellman (DBDH) assumption. In addition, we show how to use our scheme to construct an efficient threshold public key encryption scheme and a public key encryption with non-interactive opening (PKENO) scheme. 2010-03-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/634 info:doi/10.1007/978-3-642-11925-5_10 https://ink.library.smu.edu.sg/context/sis_research/article/1633/viewcontent/Lai2010_Chapter_EfficientCCA_SecurePKEFromIden.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Chosen Ciphertext Security Public Key Encryption Identity-Based Encryption Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Chosen Ciphertext Security
Public Key Encryption
Identity-Based Encryption
Information Security
spellingShingle Chosen Ciphertext Security
Public Key Encryption
Identity-Based Encryption
Information Security
LAI, Junzuo
DENG, Robert H.
LIU, Shengli
KOU, Weidong
Efficient CCA-Secure PKE from Identity-Based Techniques
description Boneh, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure public key encryption (PKE) from any selective-ID CPA-secure identity-based encryption (IBE) schemes. Their approach treated IBE as a black box. Subsequently, Boyen, Mei, and Waters demonstrated how to build a direct CCA-secure PKE scheme from the Waters IBE scheme, which is adaptive-ID CPA secure. They made direct use of the underlying IBE structure, and required no cryptographic primitive other than the IBE scheme itself. However, their scheme requires long public key and the security reduction is loose. In this paper, we propose an efficient PKE scheme employing identity-based techniques. Our scheme requires short public key and is proven CCA-secure in the standard model (without random oracles) with a tight security reduction, under the Decisional Bilinear Diffie-Hellman (DBDH) assumption. In addition, we show how to use our scheme to construct an efficient threshold public key encryption scheme and a public key encryption with non-interactive opening (PKENO) scheme.
format text
author LAI, Junzuo
DENG, Robert H.
LIU, Shengli
KOU, Weidong
author_facet LAI, Junzuo
DENG, Robert H.
LIU, Shengli
KOU, Weidong
author_sort LAI, Junzuo
title Efficient CCA-Secure PKE from Identity-Based Techniques
title_short Efficient CCA-Secure PKE from Identity-Based Techniques
title_full Efficient CCA-Secure PKE from Identity-Based Techniques
title_fullStr Efficient CCA-Secure PKE from Identity-Based Techniques
title_full_unstemmed Efficient CCA-Secure PKE from Identity-Based Techniques
title_sort efficient cca-secure pke from identity-based techniques
publisher Institutional Knowledge at Singapore Management University
publishDate 2010
url https://ink.library.smu.edu.sg/sis_research/634
https://ink.library.smu.edu.sg/context/sis_research/article/1633/viewcontent/Lai2010_Chapter_EfficientCCA_SecurePKEFromIden.pdf
_version_ 1770570628265410560