Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper)

被引:0
|
作者
Wang, Xin [1 ,2 ]
Li, Shimin [1 ,2 ]
Xue, Rui [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Identity-based encryption; Cocks' scheme; Random oracle;
D O I
10.1007/978-3-030-26834-3_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based encryption (IBE) is an attractive primitive in modern cryptography. Cocks first gave an elegant construction of IBE under Quadratic Residuosity (QR) assumption. Unfortunately, its security works only in the Random Oracle (RO) model. In this work, we aim at providing Cock's scheme with provable security in the standard model. Specifically, we modify Cocks' scheme by explicitly instantiating the hash function using indistinguishability obfuscation in two different ways which yield two variants of Cocks' scheme. Their security are promised under well-defined selective-ID and adaptive-ID model respectively. As an additional contribution, we adapt the same method into the Boneh, LaVigne, Sabin (BLS) e(th) residuosity based IBE cryptosystem and obtain an adaptive chosen-ID secure scheme under Modified e(th) Residuosity (MER) assumption.
引用
收藏
页码:273 / 283
页数:11
相关论文
共 50 条
  • [31] Full secure identity-based encryption scheme with short public key size over lattices in the standard model
    Wang, Fenghe
    Liu, ZhenHua
    Wang, Chunxiao
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2016, 93 (06) : 854 - 863
  • [32] Efficient and Short Identity-Based Deniable Authenticated Encryption
    Jin, Chunhua
    Zhao, Jianyang
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 244 - 255
  • [33] Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
    Seo, Jae Hong
    Kobayashi, Tetsutaro
    Ohkubo, Miyako
    Suzuki, Koutarou
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 45 - 56
  • [34] A New Construction of Short Hierarchical Identity-based Signature in the Standard Model
    Zhang, Leyou
    Hu, Yupu
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (04): : 180 - 186
  • [35] Identity-based signatures in standard model
    Huiyan Chen
    Chenchen Zhang
    Acta Informatica, 2019, 56 : 471 - 486
  • [36] Identity-based signatures in standard model
    Chen, Huiyan
    Zhang, Chenchen
    ACTA INFORMATICA, 2019, 56 (06) : 471 - 486
  • [37] Identity-Based Matchmaking Encryption from Standard Lattice Assumptions
    Belfiore, Roberta Cimorelli
    De Cosmo, Andrea
    Ferrara, Anna Lisa
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT II, 2024, 14584 : 163 - 188
  • [38] Shorter identity-based encryption via asymmetric pairings
    Chen, Jie
    Lim, Hoon Wei
    Ling, San
    Wang, Huaxiong
    Wee, Hoeteck
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 73 (03) : 911 - 947
  • [39] Shorter identity-based encryption via asymmetric pairings
    Jie Chen
    Hoon Wei Lim
    San Ling
    Huaxiong Wang
    Hoeteck Wee
    Designs, Codes and Cryptography, 2014, 73 : 911 - 947
  • [40] Efficient revocable identity-based encryption with short public parameters
    Emura, Keita
    Seo, Jae Hong
    Watanabe, Yohei
    THEORETICAL COMPUTER SCIENCE, 2021, 863 : 127 - 155