An efficient and provably secure IBE scheme under the standard model

被引:1
|
作者
Xu P. [1 ]
Cui G.-H. [1 ]
Lei F.-Y. [1 ]
Tang X.-M. [1 ]
Chen J. [2 ]
机构
[1] Laboratory of Information Security, College of Computer Science, Huazhong Univ. of Sci. and Technol.
[2] College of Computer Science, Wuhan University
来源
关键词
Combined public-key; Conspiracy attack; Decisional Bilinear Diffie-Hellman Assumption; Identity-based encryption; Standard model;
D O I
10.3724/SP.J.1016.2010.00335
中图分类号
学科分类号
摘要
The Combined Public-Key scheme is a famous scheme which is commonly used to generate user's encryption-key and private-key in the identity-based encryption schemes. For overcoming the conspiracy attack on Combined Public-Key scheme, a new expanded scheme based on it is proposed in which the generation of private-key is an expansion of the corresponding part of combined public-key scheme. Based on the new expanded Combined Public-Key scheme, a new identity-based encryption scheme is proposed, and under the standard model it is provably secure based on Decisional Bilinear Diffie-Hellman Assumption. At last, by analyzing the collision of user's encryption-key and comparing the new proposed identity-based encryption scheme with three existed famously analogous schemes at the following three aspects: the tightness of reduction in security proof, the complexity of encryption and decryption and the binary length of ciphertext, it can be found that the new scheme is more efficient than them, so it is comparatively more useful.
引用
收藏
页码:335 / 344
页数:9
相关论文
共 15 条
  • [11] Cramer R., Shoup V., A practical public key cryptosystem provably secure against adaptive hosen Ciphertext, Proceedings of the Cryptology-Crypto'98, pp. 13-25, (1998)
  • [12] Boneh D., The decision diffie-hellman problem, Proceeding of the 3rd Algorithmic Number Theory Symposium, pp. 48-63, (1998)
  • [13] Canetti R., Halevi S., Katz J., Chosen-Ciphertext security from identity-based encryption, Proceedings of the Cryptology-EUROENCRYPT'2004, pp. 207-222, (2004)
  • [14] Boneh D., Katz J., Improved efficiency for CCA-secure cryptosystems built using identity-based encryption, Proceedings of the CT-RSA 2005, pp. 87-103, (2005)
  • [15] Boyen X., Mei Q., Waters B., Direct chosen ciphertext security from identity-based techniques, Proceedings of the 12th ACM CCS, pp. 320-329, (2005)