Direct chosen-ciphertext secure hierarchical ID-based encryption schemes

Jong Hwan Park, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

We describe two Hierarchical Identity Based Encryption (HIBE) schemes which are selective-ID chosen ciphertext secure. Our constructions are based on the Boneh-Boyen and the Boneh-Boyen-Goh HIBE schemes respectively. We apply the signature-based method to their HIBE schemes. The proposed l-level HIBE schemes are directly derived from l-level HIBE schemes secure against chosen plaintext attacks without padding on identities with one-bit. This is more compact than the known generic transformation suggested by Canetti et al..

Original languageEnglish
Title of host publicationPublic Key Infrastructure - 4th European PKI Workshop
Subtitle of host publicationTheory and Practice, EuroPKl 2007, Proceedings
PublisherSpringer Verlag
Pages94-109
Number of pages16
ISBN (Print)9783540734079
DOIs
Publication statusPublished - 2007
Event4th European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2007 - Palma de Mallorca, Spain
Duration: 2007 Jun 282007 Jun 30

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4582 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2007
CountrySpain
CityPalma de Mallorca
Period07/6/2807/6/30

Keywords

  • Chosen ciphertext security
  • Hierarchical identity based encryption

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Direct chosen-ciphertext secure hierarchical ID-based encryption schemes'. Together they form a unique fingerprint.

  • Cite this

    Park, J. H., & Lee, D. H. (2007). Direct chosen-ciphertext secure hierarchical ID-based encryption schemes. In Public Key Infrastructure - 4th European PKI Workshop: Theory and Practice, EuroPKl 2007, Proceedings (pp. 94-109). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4582 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-540-73408-6_7