Efficient hybrid encryption from ID-based encryption

被引:0
|
作者
Masayuki Abe
Yang Cui
Hideki Imai
Eike Kiltz
机构
[1] NTT,Information Sharing Platform Laboratories
[2] AIST,Research Center for Information Security (RCIS)
[3] Chuo University,undefined
[4] CWI Amsterdam,undefined
来源
关键词
Hybrid Encryption; Selective-ID; KEM; Threshold PKE; Chameleon hash; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
This paper deals with generic transformations from ID-based key encapsulation mechanisms (IBKEM) to hybrid public-key encryption (PKE). The best generic transformation known until now is by Boneh and Katz and requires roughly 704-bit overhead in the ciphertext. We present new generic transformations that are applicable to partitioned IBKEMs. A partitioned IBKEM is an IBKEM that provides some extra structure. Such IBKEMs are quite natural and in fact nearly all known IBKEMs have this additional property. Our first transformation yields chosen-ciphertext secure PKE schemes from selective-ID secure partitioned IBKEMs with a 256-bit overhead in ciphertext size plus one extra exponentiation in encryption/decryption. As the central tool a Chameleon Hash function is used to map the identities. We also propose other methods to remove the use of Chameleon Hash, which may be of independent technical interest. Applying our transformations to existing IBKEMs we propose a number of novel PKE schemes with different trade-offs. In some concrete instantiations the Chameleon Hash can be made “implicit” which results in improved efficiency by eliminating the additional exponentiation. Since our transformations preserve the public verifiability property of the IBE schemes it is possible to extend our results to build threshold hybrid PKE schemes. We show an analogue generic transformation in the threshold setting and present a concrete scheme which results in the most efficient threshold PKE scheme in the standard model.
引用
收藏
页码:205 / 240
页数:35
相关论文
共 50 条
  • [21] A proposal of efficient scheme of key management using ID-based encryption and biometrics
    Izumi, Akitoshi
    Ueshige, Yoshifumi
    Sakurai, Kouichi
    MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 29 - +
  • [22] Efficient Group ID-Based Encryption With Equality Test Against Insider Attack
    Ling, Yunhao
    Ma, Sha
    Huang, Qiong
    Li, Ximing
    Zhong, Yijian
    Ling, Yunzhi
    COMPUTER JOURNAL, 2021, 64 (04): : 661 - 674
  • [23] An ID-based broadcast encryption scheme for key distribution
    Du, XJ
    Wang, Y
    Ge, JH
    Wang, YM
    IEEE TRANSACTIONS ON BROADCASTING, 2005, 51 (02) : 264 - 266
  • [24] Public-key encryption from ID-based encryption without one-time signature
    Tan, Chik How
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 450 - 459
  • [25] An ID-based Broadcast Encryption Scheme for Collaborative Design
    Zhang, Ya-ling
    Zhang, Jing
    Zhang, Yi-kun
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 699 - 702
  • [26] RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBE
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    INFORMATICA, 2014, 25 (02) : 299 - 326
  • [27] ID-Based Encryption with Keyword Search Scheme from Bilinear Pairings
    Tian, Xiuxia
    Wang, Yong
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12518 - 12521
  • [28] Efficient Anonymous Multi-receiver ID-based Encryption with Constant Decryption Cost
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    Huang, Sen-Shan
    Chien, Hung-Yu
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 130 - +
  • [29] Efficient ID-Based Proxy Pre-Encryption Scheme for Data Sharing in Cloud
    Zhang, Jian-Hong
    Zhen, Wei-Na
    Zhao, Xu-Bing
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 378 - 383
  • [30] An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem
    Meshram, Chandrashekhar
    INFORMATION PROCESSING LETTERS, 2015, 115 (02) : 351 - 358