Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption
نویسندگان
چکیده
At Eurocrypt 2005, Waters proposed an efficient identity-based encryption (IBE) scheme and its extension to a hierarchical IBE (HIBE). We describe a (H)IBE scheme which improves upon Waters scheme by significantly reducing the size of the public parameters. The reduction is based on two ideas. The first idea involves partitioning n-bit identities into l-bit blocks while the second idea involves reusing public parameters over different levels of a HIBE. The basic HIBE scheme is CPA-secure and yields a (hierarchical identity-based) signature scheme. Modification of the basic HIBE scheme using ideas from the work of Boyen, Mei and Waters yields a CCA-secure hybrid HIBE scheme. Further, by appropriately using symmetric key authentication, we are able to eliminate costly pairing operations from the decryption algorithm. The protocols and the security arguments are recast in the most efficient pairing setting, i.e., the Type 3 setting. Using the asymmetric pairing setting leads to several variants of the basic protocol with associated trade-off in the ciphertext overhead and public parameter size. We also incorporate with a small improvement the probabilty analysis that was recently put forth by Bellare and Ristenpart to remove the need of “artificial abort” in the original security argument of Waters IBE. For 80-bit or 128-bit security levels, the variants of the (H)IBE schemes that we obtain are currently the most efficient and practical among all other schemes which achieve similar security under a static assumption such as the hardness of decisional bilinear Diffie-Hellman problem. The basic idea of reusing public parameters over different levels of the HIBE provides improvements to the construction of other cryptographic primitives such as signatures, wildcard identity-based encryption and certificateless encryption.
منابع مشابه
Efficient Identity-based Broadcast Encryption without Random Oracles
We propose a new efficient identity-based broadcast encryption scheme without random oracles and prove that it achieves selective identity, chosen plaintext security. Our scheme is constructed based on bilinear Diffie-Hellman inversion assumption and it is a good efficient hybrid encryption scheme, which achieves O(1)-size ciphertexts, public parameters and constant size private keys. In our sc...
متن کاملEfficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model in groups equipped with a bilinear map. Selective identity secure IBE is a slightly weaker security model than the standard security model for IBE. In this model the adversary must commit ahead of time to the identity that it intends to attack, whereas in the sta...
متن کاملFine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing
Attribute-based encryption (ABE) can be used for implementing fine-grained data sharing in cloud computing. However, most of the existing ABE schemes cannot realize attribute extension and provable security simultaneously. In this paper, we propose a fine-grained attribute-based data sharing system based on a hybrid encryption mechanism. A rigorous security proof indicates that the proposed sch...
متن کاملEfficient Identity-Based Encryption Without Random Oracles
We present the first efficient Identity-Based Encryption (IBE) scheme that is fully secure without random oracles. We first present our IBE construction and reduce the security of our scheme to the decisional Bilinear Diffie-Hellman (BDH) problem. Additionally, we show that our techniques can be used to build a new signature scheme that is secure under the computational Diffie-Hellman assumptio...
متن کاملThe k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions
Over the past decade bilinear maps have been used to build a large variety of cryptosystems. In addition to new functionality, we have concurrently seen the emergence of many strong assumptions. In this work, we explore how to build bilinear map cryptosystems under progressively weaker assumptions. We propose k-BDH, a new family of progressively weaker assumptions that generalizes the decisiona...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJACT
دوره 3 شماره
صفحات -
تاریخ انتشار 2013