Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption (Q381130)

From MaRDI portal
scientific article
Language Label Description Also known as
English
Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption
scientific article

    Statements

    Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption (English)
    0 references
    0 references
    0 references
    15 November 2013
    0 references
    Summary: The paper proposes a (H)IBE scheme, which improves upon \textit{B. Waters}' scheme from Eurocrypt 2005 [Lect. Notes Comput. Sci. 3494, 114--127 (2005; Zbl 1137.94360)] by significantly reducing the size of the public parameters. The improvement is based on two ideas: 1) partitioning the identities in smaller blocks; 2) reusing public parameters. Modification of the basic HIBE scheme yields a CCA-secure hybrid HIBE where symmetric key authentication is used to eliminate costly pairing operations from the decryption algorithm. The protocols and the security arguments are recast in the most efficient asymmetric pairing setting where one gets several variants of the basic protocol with associated trade-offs in the ciphertext overhead and public parameter size. For practical security levels, the variants we obtain are currently the most efficient and practical among all other schemes which achieve similar security under the DBDH assumption. The basic idea provides improvements to the construction of other cryptographic primitives such as signatures, wildcard IBE and certificateless encryption.
    0 references
    identity-based encryption
    0 references
    hybrid IBE
    0 references
    adaptive identity attacks
    0 references
    identity-based signature
    0 references
    IBS
    0 references
    chosen ciphertext attacks
    0 references
    asymmetric pairing
    0 references
    decision bilinear Diffie-Hellman problem
    0 references
    cryptography
    0 references
    symmetric key authentication
    0 references
    security
    0 references

    Identifiers