The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions
نویسندگان
چکیده
Over the past decade bilinear maps have been used to build a large variety of cryptosystems. In addition to new functionality, we have concurrently seen the emergence of many strong assumptions. In this work, we explore how to build bilinear map cryptosystems under progressively weaker assumptions. We propose k-BDH, a new family of progressively weaker assumptions that generalizes the decisional bilinear Diffie-Hellman (DBDH) assumption. We give evidence in the generic group model that each assumption in our family is strictly weaker than the assumptions before it. DBDH has been used for proving many schemes secure, notably identity-based and functional encryption schemes; we expect that our k-BDH will lead to generalizations of many such schemes. To illustrate the usefulness of our k-BDH family, we construct a family of selectively secure Identity-Based Encryption (IBE) systems based on it. Our system can be viewed as a generalization of the Boneh-Boyen IBE, however, the construction and proof require new ideas to fit the family. We then extend our methods to produces hierarchical IBEs and CCA security; and give a fully secure variant. In addition, we discuss the opportunities and challenges of building new systems under our weaker assumption family.
منابع مشابه
Scalable Attribute-Based Encryption Under the Strictly Weaker Assumption Family
Attribute-Based Encryption (ABE) is a special type of public key encryption that allows users to share sensitive data efficiently through fine-grained access control. The security involved in existing ABE systems is currently insufficient. These systems are usually built on the Decisional Bilinear Diffie-Hellman (DBDH) assumption or the q-type DBDH assumption, which is stronger than the DBDH as...
متن کاملA Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants
We describe a CCA-secure public-key encryption scheme, in the Cramer-Shoup paradigm, based on the Linear assumption of Boneh, Boyen, and Shacham. Through a comparison to the Kiltz tag-encryption scheme from TCC 2006, our scheme gives evidence that the CramerShoup paradigm yields CCA encryption with shorter ciphertexts than the Canetti-Halevi-Katz paradigm. We present a generalization of the Lin...
متن کاملThreshold attribute based universal designated verifier signature scheme in the standard model
In universal designated verifier signature scheme, signature holder can designate the signature to any desired designated verifier. Only the designated verifier can believe that the signature holder does have a valid publicly verifiable signature. Attribute based encryption is a novel public key primitive in cryptography and attribute based signature can provide a powerful way for users to cont...
متن کاملAttribute-Based Encryption with Non-Monotonic Access Structures
We construct an Attribute-Based Encryption (ABE) scheme that allows a user’s private key to be expressed in terms of any access formula over attributes. Previous ABE schemes were limited to expressing only monotonic access structures. We provide a proof of security for our scheme based on the Decisional Bilinear Diffie-Hellman (BDH) assumption. Furthermore, the performance of our new scheme com...
متن کاملTree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions
Cryptographic primitives based on infinite families of progressively weaker assumptions have been proposed by Hofheinz–Kiltz and by Shacham (the n-Linear assumptions) and by Escala et al. (the Matrix Diffie–Hellman assumptions). All of these assumptions are extensions of the decisional Diffie–Hellman (DDH) assumption. In contrast, in this paper, we construct (additive) homomorphic encryption (H...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2012 شماره
صفحات -
تاریخ انتشار 2012