Direct chosen-ciphertext secure hierarchical ID-based encryption schemes

Jong Hwan Park, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

We describe two Hierarchical Identity Based Encryption (HIBE) schemes which are selective-ID chosen ciphertext secure. Our constructions are based on the Boneh-Boyen and the Boneh-Boyen-Goh HIBE schemes respectively. We apply the signature-based method to their HIBE schemes. The proposed l-level HIBE schemes are directly derived from l-level HIBE schemes secure against chosen plaintext attacks without padding on identities with one-bit. This is more compact than the known generic transformation suggested by Canetti et al..

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages94-109
Number of pages16
Volume4582 LNCS
Publication statusPublished - 2007 Dec 1
Event2007 European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2007 - Palma de Mallorca, Spain
Duration: 2007 Jun 282007 Jun 30

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4582 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other2007 European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2007
CountrySpain
CityPalma de Mallorca
Period07/6/2807/6/30

Fingerprint

Identity-based Encryption
Identity-based
Encryption
Cryptography
Signature
Attack

Keywords

  • Chosen ciphertext security
  • Hierarchical identity based encryption

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Park, J. H., & Lee, D. H. (2007). Direct chosen-ciphertext secure hierarchical ID-based encryption schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4582 LNCS, pp. 94-109). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4582 LNCS).

Direct chosen-ciphertext secure hierarchical ID-based encryption schemes. / Park, Jong Hwan; Lee, Dong Hoon.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4582 LNCS 2007. p. 94-109 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4582 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Park, JH & Lee, DH 2007, Direct chosen-ciphertext secure hierarchical ID-based encryption schemes. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 4582 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4582 LNCS, pp. 94-109, 2007 European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, 07/6/28.
Park JH, Lee DH. Direct chosen-ciphertext secure hierarchical ID-based encryption schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4582 LNCS. 2007. p. 94-109. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Park, Jong Hwan ; Lee, Dong Hoon. / Direct chosen-ciphertext secure hierarchical ID-based encryption schemes. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4582 LNCS 2007. pp. 94-109 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{9b73e264198941c4bf7e4f3a38b97a8a,
title = "Direct chosen-ciphertext secure hierarchical ID-based encryption schemes",
abstract = "We describe two Hierarchical Identity Based Encryption (HIBE) schemes which are selective-ID chosen ciphertext secure. Our constructions are based on the Boneh-Boyen and the Boneh-Boyen-Goh HIBE schemes respectively. We apply the signature-based method to their HIBE schemes. The proposed l-level HIBE schemes are directly derived from l-level HIBE schemes secure against chosen plaintext attacks without padding on identities with one-bit. This is more compact than the known generic transformation suggested by Canetti et al..",
keywords = "Chosen ciphertext security, Hierarchical identity based encryption",
author = "Park, {Jong Hwan} and Lee, {Dong Hoon}",
year = "2007",
month = "12",
day = "1",
language = "English",
isbn = "9783540734079",
volume = "4582 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "94--109",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Direct chosen-ciphertext secure hierarchical ID-based encryption schemes

AU - Park, Jong Hwan

AU - Lee, Dong Hoon

PY - 2007/12/1

Y1 - 2007/12/1

N2 - We describe two Hierarchical Identity Based Encryption (HIBE) schemes which are selective-ID chosen ciphertext secure. Our constructions are based on the Boneh-Boyen and the Boneh-Boyen-Goh HIBE schemes respectively. We apply the signature-based method to their HIBE schemes. The proposed l-level HIBE schemes are directly derived from l-level HIBE schemes secure against chosen plaintext attacks without padding on identities with one-bit. This is more compact than the known generic transformation suggested by Canetti et al..

AB - We describe two Hierarchical Identity Based Encryption (HIBE) schemes which are selective-ID chosen ciphertext secure. Our constructions are based on the Boneh-Boyen and the Boneh-Boyen-Goh HIBE schemes respectively. We apply the signature-based method to their HIBE schemes. The proposed l-level HIBE schemes are directly derived from l-level HIBE schemes secure against chosen plaintext attacks without padding on identities with one-bit. This is more compact than the known generic transformation suggested by Canetti et al..

KW - Chosen ciphertext security

KW - Hierarchical identity based encryption

UR - http://www.scopus.com/inward/record.url?scp=37849035282&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=37849035282&partnerID=8YFLogxK

M3 - Conference contribution

SN - 9783540734079

VL - 4582 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 94

EP - 109

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -