Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper)

被引:0
|
作者
Wang, Xin [1 ,2 ]
Li, Shimin [1 ,2 ]
Xue, Rui [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Identity-based encryption; Cocks' scheme; Random oracle;
D O I
10.1007/978-3-030-26834-3_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based encryption (IBE) is an attractive primitive in modern cryptography. Cocks first gave an elegant construction of IBE under Quadratic Residuosity (QR) assumption. Unfortunately, its security works only in the Random Oracle (RO) model. In this work, we aim at providing Cock's scheme with provable security in the standard model. Specifically, we modify Cocks' scheme by explicitly instantiating the hash function using indistinguishability obfuscation in two different ways which yield two variants of Cocks' scheme. Their security are promised under well-defined selective-ID and adaptive-ID model respectively. As an additional contribution, we adapt the same method into the Boneh, LaVigne, Sabin (BLS) e(th) residuosity based IBE cryptosystem and obtain an adaptive chosen-ID secure scheme under Modified e(th) Residuosity (MER) assumption.
引用
收藏
页码:273 / 283
页数:11
相关论文
共 50 条
  • [1] On Anonymization of Cocks' Identity-based Encryption Scheme
    Nica, Anca-Maria
    Tiplea, Ferucio Laurentiu
    COMPUTER SCIENCE JOURNAL OF MOLDOVA, 2019, 27 (03) : 283 - 298
  • [2] Identity-based encryption with wildcards in the standard model
    School of Information Engineering, Chang'an University, Xi'an, 710064, China
    不详
    不详
    J. China Univ. Post Telecom., 2009, 1 (64-68,80):
  • [4] Identity-based Threshold Broadcast Encryption in the Standard Model
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2010, 4 (03): : 400 - 410
  • [5] Revocable identity-based matchmaking encryption in the standard model
    Jiang, Zhe
    Wang, Xiwen
    Zhang, Kai
    Gong, Junqing
    Chen, Jie
    Qian, Haifeng
    IET INFORMATION SECURITY, 2023, 17 (04) : 567 - 581
  • [6] A new Hierarchical identity-based encryption in the standard model
    Zhang, Le-You
    Hu, Yu-Pu
    Wu, Qing
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (04): : 937 - 941
  • [7] Novel identity-based broadcast encryption in the standard model
    Zhang, Leyou
    Xu, Zhiqin
    ICIC Express Letters, Part B: Applications, 2013, 4 (03): : 663 - 669
  • [8] Unbounded Hierarchical Identity-based Encryption in the Standard Model
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    Yang, Yang
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (01): : 105 - 112
  • [9] New Fuzzy Identity-Based Encryption in the Standard Model
    Ren, Yanli
    Gu, Dawu
    Wang, Shuozhong
    Zhang, Xinpeng
    INFORMATICA, 2010, 21 (03) : 393 - 407
  • [10] Adaptively secure hierarchical identity-based encryption in the standard model
    Wu, Qing
    ICIC Express Letters, 2011, 5 (4 B): : 1321 - 1326