Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem

Full metadata record
DC Field Value Language
dc.contributor.authorPark, Jong Hwan-
dc.contributor.authorLee, Kwangsu-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-04T09:14:36Z-
dc.date.available2021-09-04T09:14:36Z-
dc.date.created2021-06-18-
dc.date.issued2015-12-20-
dc.identifier.issn0020-0255-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/91555-
dc.description.abstractWe propose a new identity-based encryption (IBE) system that achieves a tight security reduction to the bilinear Diffie-Hellman (BDH) problem in the random oracle model. Tightness indicates that some level of IBE system security can be straightforwardly based on the hardness of the BDH problem at the same security level. Achieving such tightness requires two strategies: (1) a key generation technique for all identities, and (2) a searching method for the solution to the BDH problem. To implement the first strategy, our system relies on a key generation paradigm recently introduced with the Park-Lee IBE system. To implement the second strategy, we base our system on the strong twin BDH problem that includes access to a decision oracle. We compare the efficiency of our system with that of the previous Nishioka IBE system (based on the Katz-Wang key generation paradigm) combined with another tight variant of the Fujisaki-Okamoto transform. (C) 2015 Elsevier Inc. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherELSEVIER SCIENCE INC-
dc.subjectDUAL SYSTEM ENCRYPTION-
dc.subjectPUBLIC-KEY ENCRYPTION-
dc.subjectCONSTRUCTIONS-
dc.subjectPROOF-
dc.subjectHIBE-
dc.subjectIBE-
dc.titleNew chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Kwangsu-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1016/j.ins.2015.07.011-
dc.identifier.scopusid2-s2.0-84941551855-
dc.identifier.wosid000362380600016-
dc.identifier.bibliographicCitationINFORMATION SCIENCES, v.325, pp.256 - 270-
dc.relation.isPartOfINFORMATION SCIENCES-
dc.citation.titleINFORMATION SCIENCES-
dc.citation.volume325-
dc.citation.startPage256-
dc.citation.endPage270-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.subject.keywordPlusDUAL SYSTEM ENCRYPTION-
dc.subject.keywordPlusPUBLIC-KEY ENCRYPTION-
dc.subject.keywordPlusCONSTRUCTIONS-
dc.subject.keywordPlusPROOF-
dc.subject.keywordPlusHIBE-
dc.subject.keywordPlusIBE-
dc.subject.keywordAuthorIdentity-based encryption-
dc.subject.keywordAuthorTight security reduction-
dc.subject.keywordAuthorChosen-ciphertext security-
dc.subject.keywordAuthorBilinear map-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE