2014
DOI: 10.1007/978-3-319-12475-9_17
|View full text |Cite
|
Sign up to set email alerts
|

Efficient (Anonymous) Compact HIBE from Standard Assumptions

Abstract: Abstract. We present two hierarchical identity-based encryption (HIBE) schemes, denoted as H1 and H2, from Type-3 pairings with constant sized ciphertexts. Scheme H1 achieves anonymity while H2 is non-anonymous. The constructions are obtained by extending the IBE scheme recently proposed by Jutla and Roy (Asiacrypt 2013). Security is based on the standard decisional Symmetric eXternal Diffie-Hellman (SXDH) assumption. In terms of provable security properties, previous direct constructions of constant-size ciph… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 42 publications
0
10
0
Order By: Relevance
“…The overview of the bug To the authors' credit, the SW18 scheme is the same as our first construction instantiated by [46]. It means that the flaw is due to the proof methodology they employed, not their construction.…”
Section: Ciphertext Of the Decryption Querymentioning
confidence: 99%
See 2 more Smart Citations
“…The overview of the bug To the authors' credit, the SW18 scheme is the same as our first construction instantiated by [46]. It means that the flaw is due to the proof methodology they employed, not their construction.…”
Section: Ciphertext Of the Decryption Querymentioning
confidence: 99%
“…Proof of [52] The HKIBE challenge ciphertext ct id ,t can be regarded as a ciphertext for (id , T [L−1,0] (t )) in the HIBE scheme proposed by [46]. The randomness of the challenge ciphertext ct id ,t := C (id ,T [L−1,0] (t )) is correlated to the randomness of level-helper keys hk ( ) id,T (t) for the key-insulation query on (id , t, ) such that > .…”
Section: Ciphertext Of the Decryption Querymentioning
confidence: 99%
See 1 more Smart Citation
“…Because of static assumption, a nested two-system encryption parameter was adopted to prove complete security. Reference [75] proposed a hierarchical identity-based encryption (HIBE) scheme which was represented by scheme H1 and H2. In terms of provable security attributes, the direct construction of ciphertext of HIBE has one or more shortcomings, such as the security of selective identity attacks.…”
Section: ) Hierarchical Identity-based Encryption (Hibe)mentioning
confidence: 99%
“…• Constructing new ABE schemes: identity-based encryption scheme can be constructed by bilinear pairing, quadratic residue, lattice theory. ABE is widely regarded as the generalization and extension of IBE, but it only consists bilinear pairs which have limitations in efficiency [75].…”
Section: H Discuss and Analysis Of Abementioning
confidence: 99%