An efficient IBE scheme with tight security reduction in the random oracle model
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Park, Jong Hwan | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.date.accessioned | 2021-09-04T01:17:49Z | - |
dc.date.available | 2021-09-04T01:17:49Z | - |
dc.date.created | 2021-06-17 | - |
dc.date.issued | 2016-04 | - |
dc.identifier.issn | 0925-1022 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/89167 | - |
dc.description.abstract | We present a new practical identity-based encryption (IBE) system that can be another candidate for standard IBE techniques. Our construction is based on a new framework for realizing an IBE trapdoor from pairing-based groups, which is motivated from the 'two equation' revocation technique suggested by Lewko et al. (IEEE Symposium on Security and Privacy, 2010). The new framework enables our IBE system to achieve a tight security reduction to the Decisional Bilinear Diffie-Hellman assumption in the random oracle model. Due to its the tightness, our system can take as input the shorter size of security parameters than the previous practical BF, SK, and systems, which provides better efficiency to our system in terms of computational cost. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.subject | IDENTITY-BASED ENCRYPTION | - |
dc.subject | DUAL SYSTEM ENCRYPTION | - |
dc.subject | PUBLIC-KEY ENCRYPTION | - |
dc.subject | HIBE | - |
dc.title | An efficient IBE scheme with tight security reduction in the random oracle model | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1007/s10623-015-0035-0 | - |
dc.identifier.scopusid | 2-s2.0-84960401350 | - |
dc.identifier.wosid | 000372115900005 | - |
dc.identifier.bibliographicCitation | DESIGNS CODES AND CRYPTOGRAPHY, v.79, no.1, pp.63 - 85 | - |
dc.relation.isPartOf | DESIGNS CODES AND CRYPTOGRAPHY | - |
dc.citation.title | DESIGNS CODES AND CRYPTOGRAPHY | - |
dc.citation.volume | 79 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 63 | - |
dc.citation.endPage | 85 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Mathematics | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Mathematics, Applied | - |
dc.subject.keywordPlus | IDENTITY-BASED ENCRYPTION | - |
dc.subject.keywordPlus | DUAL SYSTEM ENCRYPTION | - |
dc.subject.keywordPlus | PUBLIC-KEY ENCRYPTION | - |
dc.subject.keywordPlus | HIBE | - |
dc.subject.keywordAuthor | Identity based encryption | - |
dc.subject.keywordAuthor | Bilinear maps | - |
dc.subject.keywordAuthor | Tight reduction | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.