Efficient hybrid encryption from ID-based encryption

被引:0
|
作者
Masayuki Abe
Yang Cui
Hideki Imai
Eike Kiltz
机构
[1] NTT,Information Sharing Platform Laboratories
[2] AIST,Research Center for Information Security (RCIS)
[3] Chuo University,undefined
[4] CWI Amsterdam,undefined
来源
关键词
Hybrid Encryption; Selective-ID; KEM; Threshold PKE; Chameleon hash; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
This paper deals with generic transformations from ID-based key encapsulation mechanisms (IBKEM) to hybrid public-key encryption (PKE). The best generic transformation known until now is by Boneh and Katz and requires roughly 704-bit overhead in the ciphertext. We present new generic transformations that are applicable to partitioned IBKEMs. A partitioned IBKEM is an IBKEM that provides some extra structure. Such IBKEMs are quite natural and in fact nearly all known IBKEMs have this additional property. Our first transformation yields chosen-ciphertext secure PKE schemes from selective-ID secure partitioned IBKEMs with a 256-bit overhead in ciphertext size plus one extra exponentiation in encryption/decryption. As the central tool a Chameleon Hash function is used to map the identities. We also propose other methods to remove the use of Chameleon Hash, which may be of independent technical interest. Applying our transformations to existing IBKEMs we propose a number of novel PKE schemes with different trade-offs. In some concrete instantiations the Chameleon Hash can be made “implicit” which results in improved efficiency by eliminating the additional exponentiation. Since our transformations preserve the public verifiability property of the IBE schemes it is possible to extend our results to build threshold hybrid PKE schemes. We show an analogue generic transformation in the threshold setting and present a concrete scheme which results in the most efficient threshold PKE scheme in the standard model.
引用
收藏
页码:205 / 240
页数:35
相关论文
共 50 条
  • [41] Towards Tightly Secure Lattice Short Signature and Id-Based Encryption
    Boyen, Xavier
    Li, Qinyi
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 404 - 434
  • [42] Hierarchical ID-Based Searchable Encryption with Constant Size Ciphertext in Cloud
    Wang, Xiaofen
    Zhang, Xiaosong
    Mu, Yi
    2015 IEEE INTERNATIONAL CONFERENCE ON SMART CITY/SOCIALCOM/SUSTAINCOM (SMARTCITY), 2015, : 1024 - 1031
  • [43] Lattice-Based Anonymous Multi-Receiver ID-Based Encryption
    Fan, Chun-, I
    Jia, Zhen-Yu
    Zhuang, Er-Shuo
    2021 INTERNATIONAL CONFERENCE ON SECURITY AND INFORMATION TECHNOLOGIES WITH AI, INTERNET COMPUTING AND BIG-DATA APPLICATIONS, 2023, 314 : 304 - 314
  • [44] Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE
    Cui, Yang
    Morozov, Kirill
    Kobara, Kazukuni
    Imai, Hideki
    APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS, AND ERROR-CORRECTING CODES, 2009, 5527 : 159 - 168
  • [45] ID-Based Multireceiver Homomorphic Proxy Re-Encryption in Federated Learning
    Fan, Chun-, I
    Hsu, Ya-Wen
    Shie, Cheng-Han
    Tseng, Yi-Fan
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2022, 18 (04)
  • [46] Relations between the security models for certificateless encryption and ID-based key agreement
    D. Fiore
    R. Gennaro
    N. P. Smart
    International Journal of Information Security, 2012, 11 : 1 - 22
  • [47] Relations between the security models for certificateless encryption and ID-based key agreement
    Fiore, D.
    Gennaro, R.
    Smart, N. P.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (01) : 1 - 22
  • [48] Direct chosen-ciphertext secure hierarchical ID-Based encryption schemes
    Park, Jong Hwan
    Lee, Dong Hoon
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2007, 4582 : 94 - +
  • [49] ID-based authentication scheme combined with identity-based encryption with fingerprint hashing
    Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China
    不详
    J. China Univ. Post Telecom., 2008, 4 (75-80,120):