logo

SCIENCE CHINA Information Sciences, Volume 60, Issue 11: 119104(2017) https://doi.org/10.1007/s11432-016-9204-6

Direct constructions and proofs for CCA secure (LR)IBE with dual system encryption

Yi ZHAO1,2, Bo YANG1,2,*
More info
  • ReceivedNov 10, 2016
  • AcceptedJul 19, 2017
  • PublishedSep 21, 2017

Abstract

There is no abstract available for this article.


Acknowledgment

This work was supported by National Natural Science Foundation of China (Grant Nos. 61572303, 61772326), National Key Research and Development Program of China (Grant Nos. 2017YFB0802003, 2017YFB0802004), National Cryptography Development Fund during the 13th Five-Year Plan Period (Grant No. MMJJ20170216), Foundation of State Key Laboratory of Information Security (Grant No. 2017-MS-03), and Fundamental Research Funds for the Central Universities (Grant No. GK201702004).


References

[1] Boneh D, Boyen X. Efficient selective-ID secure identity-based encryption without random oracles. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2004. 223--238. Google Scholar

[2] Lewko A, Waters B. New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Proceedings of the 7th International Conference on Theory of Cryptography, Zurich, 2010. 455--479. Google Scholar

[3] Naor M, Segev G. Public-key cryptosystems resilient to key leakage. In: Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, 2009. 18--35. Google Scholar

[4] Cramer R, Shoup V. Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology. Berlin: Springer, 2002. 45--64. Google Scholar

[5] Chow S, Dodis Y, Rouselakis Y, et al. Practical leakage-resilient identity-based encryption from simple assumptions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, 2010. 152--161. Google Scholar

[6] Lewko A, Rouselakis Y, Waters B. Achieving leakage resilience through dual system encryption. In: Proceedings of the 8th Conference on Theory of Cryptography, Providence, 2011. 70--88. Google Scholar

[7] Li J, Guo Y, Yu Q. Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage. Security Comm Networks, 2016, 9: 1016-1024 CrossRef Google Scholar

[8] Kiltz E, Vahlis Y. CCA2 secure IBE: standard model efficiency through authenticated symmetric encryption. In: Proceedings of the Cryptopgraphers' Track at the RSA Conference on Topics in Cryptology, San Francisco, 2008. 221--238. Google Scholar

[9] Alwen J, Dodis Y, Naor M, et al. Public-Key encryption in the bounded-retrieval model. In: Proceedings of the 29th Annual International Conference on Theory and Applications of Cryptographic Techniques, French Riviera, 2010. 113--134. Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1