Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper)

被引:0
|
作者
Wang, Xin [1 ,2 ]
Li, Shimin [1 ,2 ]
Xue, Rui [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Identity-based encryption; Cocks' scheme; Random oracle;
D O I
10.1007/978-3-030-26834-3_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based encryption (IBE) is an attractive primitive in modern cryptography. Cocks first gave an elegant construction of IBE under Quadratic Residuosity (QR) assumption. Unfortunately, its security works only in the Random Oracle (RO) model. In this work, we aim at providing Cock's scheme with provable security in the standard model. Specifically, we modify Cocks' scheme by explicitly instantiating the hash function using indistinguishability obfuscation in two different ways which yield two variants of Cocks' scheme. Their security are promised under well-defined selective-ID and adaptive-ID model respectively. As an additional contribution, we adapt the same method into the Boneh, LaVigne, Sabin (BLS) e(th) residuosity based IBE cryptosystem and obtain an adaptive chosen-ID secure scheme under Modified e(th) Residuosity (MER) assumption.
引用
收藏
页码:273 / 283
页数:11
相关论文
共 50 条
  • [41] Wildcarded Identity-Based Encryption
    Michel Abdalla
    James Birkett
    Dario Catalano
    Alexander W. Dent
    John Malone-Lee
    Gregory Neven
    Jacob C. N. Schuldt
    Nigel P. Smart
    Journal of Cryptology, 2011, 24 : 42 - 82
  • [42] Idealizing Identity-Based Encryption
    Hofheinz, Dennis
    Matt, Christian
    Maurer, Ueli
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 495 - 520
  • [43] Fuzzy identity-based encryption
    Sahai, A
    Waters, B
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 457 - 473
  • [44] Identity-based encryption and beyond
    Martin, Luther
    IEEE SECURITY & PRIVACY, 2008, 6 (05) : 62 - 64
  • [45] On the Anonymity of Identity-Based Encryption
    Luo, Song
    Hu, Ning
    JOURNAL OF APPLIED MATHEMATICS, 2013,
  • [46] Wildcarded Identity-Based Encryption
    Abdalla, Michel
    Birkett, James
    Catalano, Dario
    Dent, Alexander W.
    Malone-Lee, John
    Neven, Gregory
    Schuldt, Jacob C. N.
    Smart, Nigel P.
    JOURNAL OF CRYPTOLOGY, 2011, 24 (01) : 42 - 82
  • [47] Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction
    Dutta, Priyanka
    Susilo, Willy
    Duong, Dung Hoang
    Baek, Joonsang
    Roy, Partha Sarathi
    INFORMATION SECURITY APPLICATIONS, WISA 2020, 2020, 12583 : 245 - 257
  • [48] Efficient Identity-Based Signcryption in the Standard Model
    Li, Fagen
    Bin Muhaya, Fahad
    Zhang, Mingwu
    Takagi, Tsuyoshi
    PROVABLE SECURITY, 2011, 6980 : 120 - +
  • [49] Efficient identity-based signatures in the standard model
    Narayan, S.
    Parampalli, U.
    IET INFORMATION SECURITY, 2008, 2 (04) : 108 - 118
  • [50] Secure identity-based signcryption in the standard model
    Li, Fagen
    Takagi, Tsuyoshi
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (11-12) : 2685 - 2694