Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles

نویسندگان

  • Eike Kiltz
  • David Galindo
چکیده

We describe a new and practical identity-based key encapsulation mechanism that is secure in the standard model against chosen-ciphertext (CCA2) attacks. Since our construction is direct and not based on hierarchical identity-based encryption, it is more efficient than all previously proposed schemes. Furthermore, we give the first chosen-ciphertext secure identity-based key encapsulation mechanism with threshold key delegation and decryption in the standard model. 1 CWI Amsterdam, The Netherlands. Email: [email protected]. URL: http://kiltz.net. 2 Institute for Computing and Information Sciences, Radboud University Nijmegen, The Netherlands. Email: [email protected]. URL: http://www.cs.ru.nl/~dgalindo/.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles

We present a non-interactive chosen ciphertext secure threshold encryption system. The proof of security is set in the standard model and does not use random oracles. Our construction uses the recent identity based encryption system of Boneh and Boyen and the chosen ciphertext secure construction of Canetti, Halevi, and Katz.

متن کامل

Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles

We present a new technique to realize attribute-based encryption (ABE) schemes secure in the standard model against chosen-ciphertext attacks (CCA-secure). Our approach is to extend certain concrete chosen-plaintext secure (CPA-secure) ABE schemes to achieve more efficient constructions than the known generic constructions of CCA-secure ABE schemes. We restrict ourselves to the construction of ...

متن کامل

Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM

(1, 2, 3, 4, 5. College of Information Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, P.R.China) * corresponding author 1. E-mail: [email protected] 2. E-mail: [email protected] 3. E-mail: [email protected] 4. E-mail: [email protected] 5. E-mail: [email protected] Abstract. We use hybrid encryption with Fuzzy Identity-Based Encryption (F...

متن کامل

Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices

An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure protocol against advanced attacks such as key compromise impersonation and maximal exposure attacks without relying on random oracles. HMQV, a state of the art AKE protocol, achieves both efficiency and the strong security model proposed by Krawczyk (we call it the CK model), which includes resistance...

متن کامل

Authenticated Key Exchange and Key Encapsulation Without Random Oracles

This paper presents a new paradigm to realize cryptographic primitives such as authenticated key exchange and key encapsulation without random oracles under three assumptions: the decisional Diffie-Hellman (DDH) assumption, target collision resistant (TCR) hash functions and a class of pseudo-random functions (PRFs), πPRFs, PRFs with pairwise-independent random sources. We propose a (PKI-based)...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2006  شماره 

صفحات  -

تاریخ انتشار 2006