Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper)

被引:0
|
作者
Wang, Xin [1 ,2 ]
Li, Shimin [1 ,2 ]
Xue, Rui [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Identity-based encryption; Cocks' scheme; Random oracle;
D O I
10.1007/978-3-030-26834-3_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based encryption (IBE) is an attractive primitive in modern cryptography. Cocks first gave an elegant construction of IBE under Quadratic Residuosity (QR) assumption. Unfortunately, its security works only in the Random Oracle (RO) model. In this work, we aim at providing Cock's scheme with provable security in the standard model. Specifically, we modify Cocks' scheme by explicitly instantiating the hash function using indistinguishability obfuscation in two different ways which yield two variants of Cocks' scheme. Their security are promised under well-defined selective-ID and adaptive-ID model respectively. As an additional contribution, we adapt the same method into the Boneh, LaVigne, Sabin (BLS) e(th) residuosity based IBE cryptosystem and obtain an adaptive chosen-ID secure scheme under Modified e(th) Residuosity (MER) assumption.
引用
收藏
页码:273 / 283
页数:11
相关论文
共 50 条
  • [21] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [22] Efficient batch identity-based fully homomorphic encryption scheme in the standard model
    Hu, Mingxing
    Ye, Qing
    Tang, Yongli
    IET INFORMATION SECURITY, 2018, 12 (06) : 475 - 483
  • [23] Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model
    Zhang, Leyou
    Wang, Zhuanning
    Wu, Qing
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 201 - 210
  • [24] Revocable Identity-Based Encryption Scheme Under LWE Assumption the Standard Model
    Zhang, Yaling
    Wang, Shangping
    Du, Qing
    IEEE ACCESS, 2018, 6 : 65298 - 65307
  • [25] Efficient Forward-Secure Identity-Based Encryption Scheme in the Standard Model
    Lu, Yang
    THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE, 2011, 164 : 62 - 69
  • [26] Efficient Identity-based Proxy Re-encryption on Lattice in the Standard Model
    Jiang Mingming
    Guo Yuyan
    Yu Lei
    Song Wangan
    Wei Shimin
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (01) : 61 - 66
  • [27] Full Secure Identity-based Encryption Scheme over Lattices in the Standard Model
    Wang Jizhong
    Wang Chunxiao
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 412 - 415
  • [28] Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model
    Yongli T.
    Mingming W.
    Qing Y.
    Panke Q.
    Zongqu Z.
    Journal of China Universities of Posts and Telecommunications, 2019, 26 (04): : 70 - 79
  • [29] Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model
    Tang Yongli
    Wang Mingming
    Ye Qing
    Qin Panke
    Zhao Zongqu
    The Journal of China Universities of Posts and Telecommunications, 2019, (04) : 70 - 79
  • [30] Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model
    Tang Yongli
    Wang Mingming
    Ye Qing
    Qin Panke
    Zhao Zongqu
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2019, 26 (04) : 70 - 79