Advertisement

Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Direct constructions and proofs for CCA secure (LR)IBE with dual system encryption

This is a preview of subscription content, log in to check access.

References

  1. 1

    Boneh D, Boyen X. Efficient selective-ID secure identity-based encryption without random oracles. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2004. 223–238

  2. 2

    Lewko A, Waters B. New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Proceedings of the 7th International Conference on Theory of Cryptography, Zurich, 2010. 455–479

  3. 3

    Naor M, Segev G. Public-key cryptosystems resilient to key leakage. In: Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, 2009. 18–35

  4. 4

    Cramer R, Shoup V. Universal hash proofs and a paradigm for adaptive chosen ciphertext secure publickey encryption. In: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology. Berlin: Springer, 2002. 45–64

  5. 5

    Chow S, Dodis Y, Rouselakis Y, et al. Practical leakage-resilient identity-based encryption from simple assumptions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, 2010. 152–161

  6. 6

    Lewko A, Rouselakis Y, Waters B. Achieving leakage resilience through dual system encryption. In: Proceedings of the 8th Conference on Theory of Cryptography, Providence, 2011. 70–88

  7. 7

    Li J, Guo Y, Yu Q, et al. Provably secure identitybased encryption resilient to post-challenge continuous auxiliary inputs leakage. Secur Commun Netw, 2016, 9: 1016–1024

  8. 8

    Kiltz E, Vahlis Y. CCA2 secure IBE: standard model efficiency through authenticated symmetric encryption. In: Proceedings of the Cryptopgraphers’ Track at the RSA Conference on Topics in Cryptology, San Francisco, 2008. 221–238

  9. 9

    Alwen J, Dodis Y, Naor M, et al. Public-Key encryption in the bounded-retrieval model. In: Proceedings of the 29th Annual International Conference on Theory and Applications of Cryptographic Techniques, French Riviera, 2010. 113–134

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. 61572303, 61772326), National Key Research and Development Program of China (Grant Nos. 2017YFB0802003, 2017YFB0802004), National Cryptography Development Fund during the 13th Five-Year Plan Period (Grant No. MMJJ20170216), Foundation of State Key Laboratory of Information Security (Grant No. 2017-MS-03), and Fundamental Research Funds for the Central Universities (Grant No. GK201702004).

Author information

Correspondence to Bo Yang.

Additional information

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Zhao, Y., Yang, B. Direct constructions and proofs for CCA secure (LR)IBE with dual system encryption. Sci. China Inf. Sci. 60, 119104 (2017). https://doi.org/10.1007/s11432-016-9204-6

Download citation