An efficient and provably secure IBE scheme under the standard model

被引:1
|
作者
Xu P. [1 ]
Cui G.-H. [1 ]
Lei F.-Y. [1 ]
Tang X.-M. [1 ]
Chen J. [2 ]
机构
[1] Laboratory of Information Security, College of Computer Science, Huazhong Univ. of Sci. and Technol.
[2] College of Computer Science, Wuhan University
来源
关键词
Combined public-key; Conspiracy attack; Decisional Bilinear Diffie-Hellman Assumption; Identity-based encryption; Standard model;
D O I
10.3724/SP.J.1016.2010.00335
中图分类号
学科分类号
摘要
The Combined Public-Key scheme is a famous scheme which is commonly used to generate user's encryption-key and private-key in the identity-based encryption schemes. For overcoming the conspiracy attack on Combined Public-Key scheme, a new expanded scheme based on it is proposed in which the generation of private-key is an expansion of the corresponding part of combined public-key scheme. Based on the new expanded Combined Public-Key scheme, a new identity-based encryption scheme is proposed, and under the standard model it is provably secure based on Decisional Bilinear Diffie-Hellman Assumption. At last, by analyzing the collision of user's encryption-key and comparing the new proposed identity-based encryption scheme with three existed famously analogous schemes at the following three aspects: the tightness of reduction in security proof, the complexity of encryption and decryption and the binary length of ciphertext, it can be found that the new scheme is more efficient than them, so it is comparatively more useful.
引用
收藏
页码:335 / 344
页数:9
相关论文
共 15 条
  • [1] Shamir A., Identity-based cryptosystems and signature schemes, Proceedings of the CRYPTO'84, pp. 48-53, (1985)
  • [2] Boneh D., Franklin M., Identity-based encryption from the weil pairing, Proceedings of the Cryptology-Crypto 2001, pp. 229-231, (2001)
  • [3] Bellare M., Boldyreva A., Palacio A., An uninstantiable random-oracle-model scheme for a hybrid-encryption problem, Proceedings of the Cryptology-EUROENCRYPT'2004, pp. 171-188, (2004)
  • [4] Boneh D., Boyen X., Secure identity based encryption without random oracles, Proceedings of the Cryptology-Crypto 2004, pp. 443-459, (2004)
  • [5] Boneh D., Boyen X., Efficient selective-ID identity based encryption without random oracles, Proceedings of the Cryptology-EUROENCRYPT'2004, pp. 223-238, (2004)
  • [6] Waters B., Efficient identity-based encryption without random oracles, Proceedings of the Cryptology-EUROENCRYPT'2005, pp. 114-127, (2005)
  • [7] Gentry C., Practical identity-based encryption without random oracles, Proceedings of the Cryptology-EUROENCRYPT'2006, pp. 445-464, (2006)
  • [8] Zhong X., Lu L.-R., Nan X.-H., A project designed by IBE encryption system based on SPK, Microcomputer Information,, 21, 4, pp. 226-227, (2005)
  • [9] Chen H.-P., Guan Z., Some questions explained about CPK, Information Security and Communication Privacy, 160, 9, pp. 47-49, (2007)
  • [10] Xu P., Cui G.-H., Lei F.-Y., An efficient and provably secure IBE scheme without bilinear map, Journal of Computer Research and Development, 45, 10, pp. 1687-1695, (2008)