Efficient CCA-Secure PKE from Identity-Based Techniques
Boneh, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure public key encryption (PKE) from any selective-ID CPA-secure identity-based encryption (IBE) schemes. Their approach treated IBE as a black box. Subsequently, Boyen, Mei, and Waters demonstrated how to build a direc...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2010
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/634 https://ink.library.smu.edu.sg/context/sis_research/article/1633/viewcontent/Lai2010_Chapter_EfficientCCA_SecurePKEFromIden.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-1633 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-16332020-07-22T07:28:49Z Efficient CCA-Secure PKE from Identity-Based Techniques LAI, Junzuo DENG, Robert H. LIU, Shengli KOU, Weidong Boneh, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure public key encryption (PKE) from any selective-ID CPA-secure identity-based encryption (IBE) schemes. Their approach treated IBE as a black box. Subsequently, Boyen, Mei, and Waters demonstrated how to build a direct CCA-secure PKE scheme from the Waters IBE scheme, which is adaptive-ID CPA secure. They made direct use of the underlying IBE structure, and required no cryptographic primitive other than the IBE scheme itself. However, their scheme requires long public key and the security reduction is loose. In this paper, we propose an efficient PKE scheme employing identity-based techniques. Our scheme requires short public key and is proven CCA-secure in the standard model (without random oracles) with a tight security reduction, under the Decisional Bilinear Diffie-Hellman (DBDH) assumption. In addition, we show how to use our scheme to construct an efficient threshold public key encryption scheme and a public key encryption with non-interactive opening (PKENO) scheme. 2010-03-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/634 info:doi/10.1007/978-3-642-11925-5_10 https://ink.library.smu.edu.sg/context/sis_research/article/1633/viewcontent/Lai2010_Chapter_EfficientCCA_SecurePKEFromIden.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Chosen Ciphertext Security Public Key Encryption Identity-Based Encryption Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Chosen Ciphertext Security Public Key Encryption Identity-Based Encryption Information Security |
spellingShingle |
Chosen Ciphertext Security Public Key Encryption Identity-Based Encryption Information Security LAI, Junzuo DENG, Robert H. LIU, Shengli KOU, Weidong Efficient CCA-Secure PKE from Identity-Based Techniques |
description |
Boneh, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure public key encryption (PKE) from any selective-ID CPA-secure identity-based encryption (IBE) schemes. Their approach treated IBE as a black box. Subsequently, Boyen, Mei, and Waters demonstrated how to build a direct CCA-secure PKE scheme from the Waters IBE scheme, which is adaptive-ID CPA secure. They made direct use of the underlying IBE structure, and required no cryptographic primitive other than the IBE scheme itself. However, their scheme requires long public key and the security reduction is loose. In this paper, we propose an efficient PKE scheme employing identity-based techniques. Our scheme requires short public key and is proven CCA-secure in the standard model (without random oracles) with a tight security reduction, under the Decisional Bilinear Diffie-Hellman (DBDH) assumption. In addition, we show how to use our scheme to construct an efficient threshold public key encryption scheme and a public key encryption with non-interactive opening (PKENO) scheme. |
format |
text |
author |
LAI, Junzuo DENG, Robert H. LIU, Shengli KOU, Weidong |
author_facet |
LAI, Junzuo DENG, Robert H. LIU, Shengli KOU, Weidong |
author_sort |
LAI, Junzuo |
title |
Efficient CCA-Secure PKE from Identity-Based Techniques |
title_short |
Efficient CCA-Secure PKE from Identity-Based Techniques |
title_full |
Efficient CCA-Secure PKE from Identity-Based Techniques |
title_fullStr |
Efficient CCA-Secure PKE from Identity-Based Techniques |
title_full_unstemmed |
Efficient CCA-Secure PKE from Identity-Based Techniques |
title_sort |
efficient cca-secure pke from identity-based techniques |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2010 |
url |
https://ink.library.smu.edu.sg/sis_research/634 https://ink.library.smu.edu.sg/context/sis_research/article/1633/viewcontent/Lai2010_Chapter_EfficientCCA_SecurePKEFromIden.pdf |
_version_ |
1770570628265410560 |