Efficient Identity-Based Encryption with Tight Security Reduction(<Special Section>Information Theory and Its Applications)
スポンサーリンク
概要
- 論文の詳細を見る
In this paper, we present an efficient variant of the Boneh-Franklin scheme that achieves a tight security reduction. Our scheme is basically an IBE scheme under two keys, one of which is randomly chosen and given to the user. It can be viewed as a continuation of an idea introduced by Katz and Wang; however, unlike the Katz-Wang variant, our scheme is quite efficient, as its ciphertext size is roughly comparable to that of the original full Boneh-Franklin scheme. The security of our scheme can be based on either the gap bilinear Diffie-Hellman (GBDH) or the decisional bilinear Diffie-Hellman (DBDH) assumptions.
- 社団法人電子情報通信学会の論文
- 2007-09-01
著者
-
IMAI Hideki
Chuo University
-
Imai H
National Inst. Of Advanced Industrial Sci. And Technol. Tokyo Jpn
-
Imai Hideki
Faculty Of Science And Engineering Chuo University:research Center For Information Security (rcis) N
-
HANAOKA Goichiro
National Institute of Advanced Industrial Science and Technology
-
IMAI Hideki
National Institute of Advanced Industrial Science and Technology
-
Hanaoka Goichiro
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Hanaoka Goichiro
Institute Of Industrial Science The University Of Tokyo
-
Hanaoka Goichiro
3rd Department Institute Of Industrial Science The University Of Tokyo
-
Zhang Rui
National Institute Of Advanced Industrial Science And Technology (aist)
-
Zhang R
Univ. Tokushima School Of Medicine Tokushima Jpn
-
Zhang Rui
National Inst. Advanced Industrial Sci. And Technol. Tokyo Jpn
-
Imai Hideki
National Inst. Of Advanced Industrial Sci. & Technol. (aist) Tokyo Jpn
-
Furukawa J
Nec Corp. Kawasaki‐shi Jpn
-
ATTRAPADUNG Nuttapong
AIST
-
ATTRAPADUNG Nuttapong
University of Tokyo
-
FURUKAWA Jun
NEC Corporation
-
GOMI Takeshi
University of Tokyo
-
Attrapadung Nuttapong
Aist Tokyo Jpn
-
Hanaoka G
National Institute Of Advanced Industrial Science And Technology
-
Zhang R
Yale Univ. Ct Usa
-
Hanaoka Goichiro
National Inst. Of Advanced Industrial Sci. And Technol. Tokyo Jpn
-
Imai Hideki
National Inst. Advanced Industrial Sci. And Technol. Tokyo Jpn
-
Imai Hideki
National Astronomical Observatory
-
Furukawa Jun
Nec Corp.
関連論文
- Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions
- Information Theoretical Secure Oblivious Polynomial Evaluation : Model, Bounds and Constructions
- Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
- Extension of Broadcasting Service by Using Electronic Tokens(Contents Technology and Web Information Systems)
- Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service(Discrete Mathematics and Its Applications)
- Unconditionally Secure Chaffing-and-Winnowing
- A New Quaternion Design for Space-Time-Polarization Block Code with Full Diversity
- A Novel Probabilistic Passive Attack on the Protocols HB and HB^+
- Smallest Size of Circulant Matrix for Regular (3, L) and (4, L) Quasi-Cyclic LDPC Codes with Girth 6
- An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions
- Anonymous Password-Authenticated Key Exchange : New Construction and Its Extensions
- A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
- A New Security Architecture for Personal Networks and Its Performance Evaluation
- RSA-Based Password-Authenticated Key Exchange, Revisited
- A Secure Authenticated Key Exchange Protocol for Credential Services
- An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction(Information Security)
- New Security Architecture for Mobile IPv6 Networks
- Notes on Formal Methods Used for Verification of the Security Properties of Protocols Used in Wireless Environment
- A Leakage-Resilient Network Storage System
- Security Analysis of Password-based Protocols via FDR and AVISPA
- A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications(Information Security)
- An Efficient Leakage-Resilient Authenticated Key Exchange Protocol
- A Secure and Lightweight Authenticated Key Exchange Protocol for Wireless Networks
- Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way
- Asymmetric RFID System Secure against Active Attack
- The MAC-based Construction of Strong Multiple Encryption
- Efficient Strong Multiple Encryption from Relaxed Conditions
- ID-based Encryption for Directed Acyclic Graph Hierarchies : Unification of Key-evolving Encryption Primitives (Extended Abstract)
- Shielding Asymmetric Cryptosystems from Decryption Failures
- A Bandwidth-Saving Public Key Encryption Conversion Scheme
- Towards Removing Random Oracles from OAEP
- Invisibly Sanitizable Digital Signature Scheme
- Developmental Characteristics of Mice Lacking the DNA Excision Repair Gene XPG
- Neuronal Migration and Neuronal Migration Disorder in Cerebral Cortex
- Best Truncated and Impossible Differentials of Feistel Block Ciphers with S-D (Substitution and Diffusion) or D-S Round Functions(Special Section on Cryptography and Information Security)
- An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation
- Flaws in Robust Optimistic Mix-Nets and Stronger Security Notions(Protocol, Cryptography and Information Security)
- Spectroscopic Studies of the Solar Corona I. Spatial Variations in Line Parameters of Green and Red Coronal Lines
- Daily Urinary Excretion of Bisphenol A
- Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes(Information Security)
- A Novel Approach to Algebraic and Fast Correlation Attacks for Cryptanalysis of Certain Keystream Generators
- CCA-Secure Public Key Encryption without Group-Dependent Hash Functions
- Formal Security Treatments for IBE-to-Signature Transformation : Relations among Security Notions
- A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions
- Key-Insulated Public Key Encryption with Auxiliary Helper Key : Model, Constructions and Formal Security Proofs(Information Theory and Its Applications)
- Efficient Identity-Based Encryption with Tight Security Reduction(Information Theory and Its Applications)
- A New Key-Insulated Public Key Encryption Scheme with Auxiliary Helper Key
- Security Tightness Evaluation of Fujisaki-Okamoto Conversion in Identity Based Encryption
- Searchable Public-key Broadcast Encryption
- Relations among Notions of Security for Identity Based Encryption Schemes (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Towards Security Enhancement with Efficient Reduction for Identity Based Encryption
- CCA-secure IBE Scheme with Tight Security Reduction based on the Gap BDH Assumption
- A Remark on GEM
- An Implementation of KPS with Distributed Trust
- Sliced Onion Routing Scheme and its Aptitude for Sender-Identifiable Environments
- Optimally Mastering Keys in Various Broadcast Encryption Schemes
- Personal Entropy from Graphical Passwords : Methods for Quantification and Practical Key Generation(Cryptography and Information Security)(Information Theory and Its Applications)
- Managing Encryption and Key Publication Independently in Digital Rights Management Systems (Applications) (Cryptography and Information Security)
- On Evaluating the Entropy of Graphical Passwords
- An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability(Special Section on Cryptography and Information Security)
- A genetic mouse model carrying the nonfunctional xeroderma pigmentosum group G gene
- A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures : Special Section on Cryptography and Information Security
- Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure(Application,Cryptography and Information Security)
- Unconditionally Secure Authenticated Encryption(Discrete Mathematics and Its Applications)
- Efficient Unconditionally Secure Digital Signatures (Asymmetric Cipher) (Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures
- A Traitor Traceable Conference System with Dynamic Sender(Special Section on Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
- Improving the Secure Electronic Transaction Protocol by Using Signcryption
- Optimal Unconditionally Secure ID-Based Key Distribution Scheme for Large-Scaled Networks : Special Section on Cryptography and Information Security
- An Optimization of Credit-Based Payment for Electronic Toll Collection Systems
- Traceability Schemes against Illegal Distribution of Signed Documents(Discrete Mathematics and Its Applications)
- The Role of Arbiters for Unconditionally Secure Authentication(Discrete Mathematics and Its Applications)
- Stateful key encapsulation mechanism (情報通信システムセキュリティ)
- Stateful key encapsulation mechanism (技術と社会・倫理)
- Stateful key encapsulation mechanism (情報セキュリティ)
- New Short Signature Scheme without Random Oracles
- An Efficient Group Signature Scheme from Bilinear Maps(Discrete Mathematics and Its Applications)
- Efficient Provider Authentication for Bidirectional Broadcasting Service
- A Trade-off Traitor Tracing Scheme
- AT-2-2 A Survey on Recent Advances in Broadcast Encryption
- Information-Theoretically Secure Key Insulated Encryption : Models, Bounds and Constructions(Cryptography and Information Security)(Information Theory and Its Applications)
- New Electrodeless Light Source Excited by a Microwave Immersed in a Uniform Static Magnetic Field
- New Electrodeless Light Source Intensified by Electron Cyclotron Resonance Heating
- An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness
- Sequential Bitwise Sanitizable Signature Schemes
- A Formulation of Key Privacy in Plaintext Checking Attack Model
- Secure Detection of Watermarks (Applications) (Cryptography and Information Security)
- Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
- How to Break COT-Based Fingerprinting Schemes and Design New One(Cryptography and Information Security, Information Theory and Its Applications)
- Adaptive Equalization with Dual Diversity-Combining (Special Issue on Land Mobile/Portable Propagation)
- Security Analysis of Two Augmented Password-Authenticated Key Exchange Protocols
- An Efficient Publicly Verifiable Mix-Net for Long Inputs(Protocols,Cryptography and Information Security)
- Efficient and Verifiable Shuffling and Shuffle-Decryption(Application)(Cryptography and Information Security)
- Secure Broadcast System with Simultaneous Individual Messaging
- How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model
- Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks
- Anonymous Credential with Attributes Certification after Registration
- Relations among Notions of Security for Identity Based Encryption Schemes
- Relations among Notions of Security for Identity Based Encryption Schemes