2005
DOI: 10.1007/11426639_26
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical Identity Based Encryption with Constant Size Ciphertext

Abstract: Abstract. We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext consists of just three group elements and decryption requires only two bilinear map computations, regardless of the hierarchy depth. Encryption is as efficient as in other HIBE systems. We prove that the scheme is selective-ID secure in the standard model and fully secure in the random oracle model. Our system has a number of applications: it gives very efficient forward secure public key and identity based cryptos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
969
0
2

Year Published

2005
2005
2022
2022

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 966 publications
(973 citation statements)
references
References 26 publications
2
969
0
2
Order By: Relevance
“…Furthermore, Boneh et al [BBG05] show that the -BDHE assumption holds in generic bilinear groups [Sho97].…”
Section: Definition 3 We Say That the (Decision) (T )-Bdhe Assumpmentioning
confidence: 99%
“…Furthermore, Boneh et al [BBG05] show that the -BDHE assumption holds in generic bilinear groups [Sho97].…”
Section: Definition 3 We Say That the (Decision) (T )-Bdhe Assumpmentioning
confidence: 99%
“…This turns out to be completely insecure; one way to see this is that an adversary can take linear combinations of the rows in X instead of the columns, since the term g βXs is insensitive to the rows or the columns of X. Hamburg's DSE scheme [14] breaks this asymmetry by "compressing" g βXs using a random linear combination of the rows (that is, β is replaced by a random vector b); the ensuing construction has a structure similar to the HIBE scheme in [7] and we only know how to prove security under a stronger q-type assumption.…”
Section: Our Resultsmentioning
confidence: 99%
“…On the other hand, protocols such as [3,5] which are secure in the selective-ID model have no security degradation. Thus, one can work with significantly smaller size groups while implementing the protocols in [3,5] compared to the protocols in [4,18,12]. The protocols that are described in this paper have no security degradation.…”
Section: Interpreting Security Modelsmentioning
confidence: 99%