Efficient hybrid encryption from ID-based encryption

被引:0
|
作者
Masayuki Abe
Yang Cui
Hideki Imai
Eike Kiltz
机构
[1] NTT,Information Sharing Platform Laboratories
[2] AIST,Research Center for Information Security (RCIS)
[3] Chuo University,undefined
[4] CWI Amsterdam,undefined
来源
关键词
Hybrid Encryption; Selective-ID; KEM; Threshold PKE; Chameleon hash; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
This paper deals with generic transformations from ID-based key encapsulation mechanisms (IBKEM) to hybrid public-key encryption (PKE). The best generic transformation known until now is by Boneh and Katz and requires roughly 704-bit overhead in the ciphertext. We present new generic transformations that are applicable to partitioned IBKEMs. A partitioned IBKEM is an IBKEM that provides some extra structure. Such IBKEMs are quite natural and in fact nearly all known IBKEMs have this additional property. Our first transformation yields chosen-ciphertext secure PKE schemes from selective-ID secure partitioned IBKEMs with a 256-bit overhead in ciphertext size plus one extra exponentiation in encryption/decryption. As the central tool a Chameleon Hash function is used to map the identities. We also propose other methods to remove the use of Chameleon Hash, which may be of independent technical interest. Applying our transformations to existing IBKEMs we propose a number of novel PKE schemes with different trade-offs. In some concrete instantiations the Chameleon Hash can be made “implicit” which results in improved efficiency by eliminating the additional exponentiation. Since our transformations preserve the public verifiability property of the IBE schemes it is possible to extend our results to build threshold hybrid PKE schemes. We show an analogue generic transformation in the threshold setting and present a concrete scheme which results in the most efficient threshold PKE scheme in the standard model.
引用
收藏
页码:205 / 240
页数:35
相关论文
共 50 条
  • [31] ID-Based Encryption with Equality Test Against Insider Attack
    Wu, Tong
    Ma, Sha
    Mu, Yi
    Zeng, Shengke
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 : 168 - 183
  • [32] A Fully Secure Revocable ID-Based Encryption in the Standard Model
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    INFORMATICA, 2012, 23 (03) : 487 - 505
  • [33] An enhanced ID-based multi-decrypters encryption scheme
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    International Review on Computers and Software, 2012, 7 (07) : 3409 - 3413
  • [34] Self-enforcing ID-based broadcast encryption scheme
    Ministry of Education Key Lab. of Computer Networks and Info. Security, Xidian Univ., Xi'an710071, China
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban), 2007, 3 (133-135):
  • [35] Breaking an ID-based encryption based on discrete logarithm and factorization problems
    Tan, Chik How
    Prabowo, Theo Fanuela
    Duc-Phong Le
    INFORMATION PROCESSING LETTERS, 2016, 116 (02) : 116 - 119
  • [36] A quantum secure ID-based cryptographic encryption based on group rings
    Gaurav Mittal
    Sunil Kumar
    Sandeep Kumar
    Sādhanā, 2022, 47
  • [37] A quantum secure ID-based cryptographic encryption based on group rings
    Mittal, Gaurav
    Kumar, Sunil
    Kumar, Sandeep
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2022, 47 (01):
  • [38] Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017
    Lee, Hyung Tae
    Wang, Huaxiong
    Zhang, Kai
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 780 - 786
  • [39] Privacy-preserving multireceiver ID-based encryption with provable security
    Tseng, Yuh-Min
    Huang, Yi-Hung
    Chang, Hui-Ju
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (07) : 1034 - 1050
  • [40] Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization
    Lai, Jianchang
    Mu, Yi
    Guo, Fuchun
    Chen, Rongmao
    COMPUTER JOURNAL, 2017, 60 (12): : 1809 - 1821