Narzędzia help

Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
first previous
cannonical link button

http://yadda.icm.edu.pl:80/baztech/element/bwmeta1.element.baztech-article-BUS8-0021-0006

Czasopismo

Fundamenta Informaticae

Tytuł artykułu

Forward-Secure Identity-Based Public-Key Encryption without Random Oracles

Autorzy Yu, J.  Cheng, X.  Hao, R.  Kong, F.  Fan, J. 
Treść / Zawartość
Warianty tytułu
Języki publikacji EN
Abstrakty
EN In traditional identity-based encryption schemes, security will be entirely lost once secret keys are exposed. However, with more and more use of mobile and unprotected devices, key exposure seems unavoidable. To deal with this problem, we newly propose a forward-secure identitybased public-key encryption scheme. In this primitive, the exposure of the secret key in one period doesn't affect the security of the ciphertext generated in previous periods. Any parameter in our scheme has at most log-squared complexity in terms of the total number of time periods. We also give the semantic security notions of forward-secure identity-based public-key encryption. The proposed scheme is proven semantically secure in the standard model. As far as we are concerned, it is the first forward-secure identity-based public-key encryption scheme without random oracles.
Słowa kluczowe
EN forward security   public-key encryption   key exposure   standard model  
Wydawca IOS Press
Czasopismo Fundamenta Informaticae
Rocznik 2011
Tom Vol. 111, nr 2
Strony 241--256
Opis fizyczny Bibliogr. 38 poz., tab.
Twórcy
autor Yu, J.
autor Cheng, X.
autor Hao, R.
autor Kong, F.
autor Fan, J.
Bibliografia
[1] Shamir, A.: Identity-based cryptosystems and signature schemes, Advances in Cryptology-Crypto 1984 (G.R. Blakley, D. Chaum, Eds.), LNCS 196, Springer-Verlag, Berlin, 1984, 47-53.
[2] Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing, Advances in Cryptology-Crypto 2001 (J. Kilian, Ed.), LNCS 2139, Springer-Verlag, Berlin, 2001, 213-229.
[3] Cocks, C.: An identity based encryption scheme based on quadratic residues, Advances in Cryptography and Coding 2001 (B. Honary, Ed.), LNCS 2260, Springer-Verlag, Berlin, 2001, 360-363.
[4] Gentry, C., Silverberg, A.: Hierarchical ID-Based Cryptography, Advances in Cryptology-ASIACRYPT 2002 (Y. Zheng, Ed.), LNCS 2501, Springer-Verlag, Berlin, 2002, 548-566.
[5] Horwitz, J., Lynn, B.: Toward Hierarchical Identity-Based Encryption, Advances in Cryptology-EUROCRYPT 2002(L.R. Knudsen, Ed.), LNCS 2332, Springer-Verlag, Berlin, 2002, 466-481.
[6] Cha, J.C., Cheon, J.H.: An identity-based signature from gap Diffie-Hellman groups, Proc. Public Key Cryptography-PKC 2003 (Y.G. Desmedt, Ed.), LNCS 2567, Springer-Verlag, Berlin, 2003, 18-30.
[7] Boneh, D., Boyen, X.: Efficient Selective-ID Identity Based Encryption without Random Oracles, Advances in Cryptology- Eurocrypt 2004 (C. Cachin, J. Camenisch, Eds.), LNCS 3027, Springer-Verlag, Berlin, 2004, 223-238.
[8] Waters, B.: Efficient Identity-Based Encryptionwithout Random Oracles, Advances in Cryptology-Eurocrypt 2005 (R. Cramer, Ed.), LNCS 3494, Springer-Verlag, Berlin, 2005, 114-127.
[9] Boneh, D., Boyen X., Goh E.J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext, Advances in Cryptology-EUROCRYPT 2005(R. Cramer, Ed.), LNCS 3494, Springer-Verlag, Berlin, 2005, 440-456.
[10] Gentry, C.: Practical identity-based encryption without random oracles, Advances in Cryptology-EUROCRYPT 2006 (S. Vaudenay, Ed.), LNCS 4404, Springer-Verlag, Berlin, 2006, 445-464.
[11] Boyen, X., Waters, B.: Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles), Advances in Cryptology-CRYPTO 2006 (C. Dwork, Ed.), LNCS 4117, Springer-Verlag, Berlin, 2006, 290-307.
[12] Paterson, K.G., Schuldt, J.C.N.: Efficient identity-based signatures secure in the standard model, Proc. ACISP'2006 (L. Batten, R. Safavi-Naini, Eds.), LNCS 4058, Springer-Verlag, Berlin, 2006, 207-222.
[13] Anderson, R.: Two remarks on public key cryptology, Invited Lecture, ACM CCS'97, 1997.
[14] Bellare, M., Miner, S.: A forward-secure digital signature scheme, Advance in Cryptology-CRYPTO 1999 (M. Wiener, Ed.), LNCS 1666, Springer-Verlag, Berlin, 1999, 431-448.
[15] Abdalla, M., Reyzin, L.: A new forward-secure digital signature scheme, Advances in Cryptology-Asiacrypt 2000 (T. Okamoto, Ed.), LNCS 1976, Springer-Verlag, Berlin, 2000, 116-129.
[16] Krawczyk, H.: Simple forward-secure signatures for any signature scheme, Proceedings of the 7th ACM Conference on Computer and Communications Security, 2000, 108-115.
[17] Itkis, G., Reyzin, L.: Forward-secure signatures with optimal signing and verifying, Advance in Cryptology-CRYPTO 2001 (J. Kilian, Ed.), LNCS 2139, Springer-Verlag, Berlin, 2001, 499-514.
[18] Kozlov, A., Reyzin, L.: Forward-secure signatures with fast key update, Proc. Third International Conference on Security in communication Networks (S. Cimato, C. Galdi, G. Persiano, Eds.), LNCS 2576, Springer-Verlag, Berlin, 2002, 247-262.
[19] Maklin, T.,Micciancio, D.,Miner, S.: Efficient generic forward-secure signatures with an unbounded number of time periods, Advances in Cryptology-EUROCRYPT 2002 (L.R. Knudsen, Ed.), LNCS 2332, Springer-Verlag, Berlin, 2002, 400-417.
[20] Hu, F.,Wu, C.H., Irwin, J.D.: A new forward secure signature scheme using bilinear maps. Cryptology ePrint Archive, Report 2003/188, 2003.
[21] Kang, B.G., Park, J.H., Hahn, S.G.: A new forward secure signature scheme. Cryptology ePrint Archive, Report 2004/183, 2004.
[22] Yu, J., Kong, F.Y., Cheng, X.G., Hao, R., Li, G.W.: Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps, In the second international conference on provable security (ProvSec 2008) (J. Baek, F. Bao, K. Fei, X. Lai, Eds.), LNCS 5324, Springer-Verlag, Berlin, 2008, 83-97.
[23] Boyen, X., Shacham, H., Shen, E., Waters, B.: Forward-Secure Signatures with Untrusted Update, The 13th ACM conference on Computer and communications security, 2006, 191-200.
[24] Libert, B., Quisquater, J., Yung, M.: Forward-secure signatures in untrusted update environments: efficient and generic constructions, The 14th ACM conference on Computer and communications security, 2007, 266-275.
[25] Bellare, M., Yee, B.: Forward-security in private-key cryptography, Topics in Cryptology-CT-RSA 2003 (M. Joye, Ed.), LNCS 2612, Springer-Verlag, Berlin, 2003, 1-18.
[26] Canetti, R., Halevi, S., Katz, J.: A forward-secure public-key encryption scheme, Advances in Cryptology-EUROCRYPT 2003 (E. Biham, Ed.), LNCS 2656, Springer-Verlag, Berlin, 2003, 255-271.
[27] Yao, D., Fazio, N., Dodis, Y., Lysyanskaya, A.: ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption, Proc. the ACM Conference on Computer and Communications Security 2004, 2004, 354-363.
[28] Yu, J., Hao, R., Kong, F.Y., Cheng, X.G., Fan, J.X., Chen, Y.K.: Forward-Secure Identity-Based Signature: Security Notions and Construction, Information Sciences, 181(3), 2011, 648-660.
[29] Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-insulated public-key cryptosystems, Advance in Cryptology-EUROCRYPT 2002 (L.R. Knudsen, Ed.), LNCS 2332, Springer-Verlag, Berlin, 2002, 65-82.
[30] Bellare, M., Palacio, A.: Protecting against key-exposure: Strongly key-insulated encryption with optimal threshold, Proc. of AAECC 2006, 2006, 379-396.
[31] Hanaoka, G., Hanaoka, Y., Imai, H.: Parallel key-insulated public key encryption, Advance in PKC 2006 (M. Yung, Y. Dodis, A. Kiayias, T. Malkin, Eds.), LNCS 3958, Springer-Verlag, Berlin, 2006, 105-122.
[32] Cheon, J.H., Hopper, N., Kim, Y.D., Osipkov, I.: Timed-release and key-insulated public key encryption, Advance in FC 2006 (G. D. Crescenzo, A. Rubin, Eds.), LNCS 4107, Springer-Verlag, Berlin, 2006, 191-205.
[33] Weng, J., Li, X.X., Chen, K.F., Liu, S.L.: Identity-Based Parallel Key-Insulated EncryptionWithout Random Oracles: Security Notions and Construc-tion, Proc. INDOCRYPT 2006 (R. Barua, T. Lange, Eds.), LNCS 4329, Springer-Verlag, Berlin, 2008, 1143-1157.
[34] Weng, J., Liu, S.L., Chen, K.F., Zheng, D., Qiu, W.D.: Identity-based threshold key-insulated encryption without random oracles, Advance in CT-RSA 2008 (T. Malkin, Ed.), LNCS 4964, Springer-Verlag, Berlin, 2008, 203-220.
[35] Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption, Advance in Cryptology-Eurocrypt 2004 (C. Cachin, J. Camenisch, Eds.), LNCS 3027, Springer-Verlag, Berlin, 2004, 207-222.
[36] Boneh, D., Katz, J.: Improved efficiency for CCA-secure cryptosystems built using identity based encryption, Advance in CT-RSA 2005 (A.J. Menezes, Ed.), LNCS 3376, Springer-Verlag, Berlin, 2005, 87-103.
[37] Boyen, X., Mei, Q., Waters, B.: Simple and efficient CCA2 security from IBE techniques, Proc. ACM CCS 2005, 2005, 320-329.
[38] Kiltz, E.: Chosen-ciphertext secure identity-based encryption in the standard model with short ciphertexts, Cryptology ePrint Archive, Report, 2006/122, 2006.
Kolekcja BazTech
Identyfikator YADDA bwmeta1.element.baztech-article-BUS8-0021-0006
Identyfikatory