2022
DOI: 10.1007/978-3-031-22390-7_5
|View full text |Cite
|
Sign up to set email alerts
|

More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…Thus, we can employ a 3-level HIBE scheme that satisfies adaptive security only for the first level and selective security for the other levels. Asano-Emura-Takayasu (AET) [39] introduced such 3-level HIBE schemes where the first level is either the Yamada IBE scheme [38] or the Jager-Kurek- 1 This is a reason why the keyword guessing attack has been widely researched: an adversary A, that has a trapdoor, generates a PEKS ciphertext for a keyword 𝑘𝑤 chosen by A and runs the test algorithm with the trapdoor. If the test algorithm outputs 1, then A can detect that 𝑘𝑤 is associated to the trapdoor.…”
Section: Our Contributionmentioning
confidence: 99%
“…Thus, we can employ a 3-level HIBE scheme that satisfies adaptive security only for the first level and selective security for the other levels. Asano-Emura-Takayasu (AET) [39] introduced such 3-level HIBE schemes where the first level is either the Yamada IBE scheme [38] or the Jager-Kurek- 1 This is a reason why the keyword guessing attack has been widely researched: an adversary A, that has a trapdoor, generates a PEKS ciphertext for a keyword 𝑘𝑤 chosen by A and runs the test algorithm with the trapdoor. If the test algorithm outputs 1, then A can detect that 𝑘𝑤 is associated to the trapdoor.…”
Section: Our Contributionmentioning
confidence: 99%
“…1.2 Differences from the Proceedings Version [23] In the proceedings version [23], we only used Yamada's IBE scheme [17] to instantiate the IBEET scheme from the proposed construction. However, there is a more efficient IBE † † In this paper, we do not follow Lee et al's argument [2] in a security proof but follow Asano et al's one [22] which is an attribute-based extension of Lee et al's work with a refined proof.…”
Section: Our Contributionmentioning
confidence: 99%