Shorter identity-based encryption via asymmetric pairings

被引:0
|
作者
Jie Chen
Hoon Wei Lim
San Ling
Huaxiong Wang
Hoeteck Wee
机构
[1] Nanyang Technological University,Division of Mathematical Sciences, School of Physical & Mathematical Sciences
[2] George Washington University,undefined
来源
关键词
Public key cryptography; Identity-based encryption ; Functional encryption; 68P25; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
We present efficient identity-based encryption (IBE) under the symmetric external Diffie–Hellman (SXDH) assumption in bilinear groups; our scheme also achieves anonymity. In our IBE scheme, all parameters have constant numbers of group elements, and are shorter than those of previous constructions based on decisional linear (DLIN) assumption. Our construction uses both dual system encryption (Waters, CRYPTO 2009) and dual pairing vector spaces (Okamoto and Takashima, Pairing 2008; ASIACRYPT 2009). Specifically, we show how to adapt the recent DLIN-based instantiation of Lewko (EUROCRYPT 2012) to the SXDH assumption. To our knowledge, this is the first work to instantiate either dual system encryption or dual pairing vector spaces under the SXDH assumption. Furthermore, our work could be extended to many other functional encryption. In Particular, we show how to instantiate our framework to inner product encryption and key-policy functional encryption. All parameters of our constructions are shorter than those of DLIN-based constructions.
引用
收藏
页码:911 / 947
页数:36
相关论文
共 50 条
  • [1] Shorter identity-based encryption via asymmetric pairings
    Chen, Jie
    Lim, Hoon Wei
    Ling, San
    Wang, Huaxiong
    Wee, Hoeteck
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 73 (03) : 911 - 947
  • [2] Identity-based broadcast encryption with shorter transmissions
    Zhang L.-Y.
    Hu Y.-P.
    Mu N.-B.
    J. Shanghai Jiaotong Univ. Sci., 2008, 6 (641-645): : 641 - 645
  • [3] Identity-based Broadcast Encryption with Shorter Transmissions
    张乐友
    胡予濮
    牟宁波
    JournalofShanghaiJiaotongUniversity(Science), 2008, 13 (06) : 641 - 645
  • [4] Identity-Based Encryption on RSA Without Pairings and Key Escrow
    ZHU Yan
    WANG Shanbiao
    MA Di
    FENG Rongquan
    Chinese Journal of Electronics, 2014, 23 (04) : 842 - 850
  • [5] Identity-Based Encryption on RSA Without Pairings and Key Escrow
    Zhu Yan
    Wang Shanbiao
    Ma Di
    Feng Rongquan
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 842 - 850
  • [6] Identity-based encryption and hierarchical identity-based encryption
    University of Waterloo, Canada
    不详
    Cryptology Inf. Secur. Ser., 2009, (45-64):
  • [7] Identity-based Broadcast Group-oriented Encryption from Pairings
    Zhang, Bo
    Xu, Qiuliang
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 405 - 408
  • [8] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [9] Revocable hierarchical identity-based encryption with shorter private keys and update keys
    Kwangsu Lee
    Seunghwan Park
    Designs, Codes and Cryptography, 2018, 86 : 2407 - 2440
  • [10] Revocable hierarchical identity-based encryption with shorter private keys and update keys
    Lee, Kwangsu
    Park, Seunghwan
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (10) : 2407 - 2440