Efficient Identity-Based Key Encapsulation to Multiple Parties

  • M. Barbosa
  • P. Farshim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3796)

Abstract

We introduce the concept of identity based key encapsulation to multiple parties (mID-KEM), and define a security model for it. This concept is the identity based analogue of public key KEM to multiple parties. We also analyse possible mID-KEM constructions, and propose an efficient scheme based on bilinear pairings. We prove our scheme secure in the random oracle model under the Gap Bilinear Diffie-Hellman assumption.

Keywords

Key Encapsulation Mechanism (KEM) Hybrid Encryption Identity Based Cryptography Provable Security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Abdalla, M., Bellare, M., Rogaway, P.: DHAES: An encryption scheme based on the Diffie-Hellman problem. Cryptology ePrint Archive, Report 1999/007 (1999)Google Scholar
  2. 2.
    Bellare, M.: Practice-priented provable-security. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396, Springer, Heidelberg (1998)CrossRefGoogle Scholar
  3. 3.
    Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in the multi-user setting: security proofs and improvements. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 259–274. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  4. 4.
    Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic constructions of identity-based and certificateless KEMs. Cryptology ePrint Archive, Report 2005/058 (2005)Google Scholar
  5. 5.
    Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. SIAM Journal on Computing 32, 586–615 (2003)MATHCrossRefMathSciNetGoogle Scholar
  6. 6.
    Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  7. 7.
    Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen-ciphertext attack. SIAM Journal on Computing 33, 167–226 (2003)MATHCrossRefMathSciNetGoogle Scholar
  8. 8.
    Dent, A.W.: A designer’s guide to KEMs. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898, pp. 133–151. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  9. 9.
    Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and Systems Sciences 28, 270–299 (1984)MATHCrossRefMathSciNetGoogle Scholar
  10. 10.
    Koblitz, N., Menezes, A.: Another look at provable security. Cryptology ePrint Archive, Report 2004/152 (2004)Google Scholar
  11. 11.
    Lynn, B.: Authenticated identity-based encryption. Cryptology ePrint Archive, Report 2002/072 (2002)Google Scholar
  12. 12.
    Miyaji, A., Nakabayashi, M., Takano, S.: New explicit conditions of elliptic curve traces for FR-reduction. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E84-A, 1234–1243 (2001)Google Scholar
  13. 13.
    Okamoto, T., Pointcheval, D.: The gap-problems: A new class of problems for the security of cryptographic schemes. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 104–118. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  14. 14.
    Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433–444. Springer, Heidelberg (1992)Google Scholar
  15. 15.
    Smart, N.P.: Access control using pairing based cryptography. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 111–121. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  16. 16.
    Smart, N.P.: Efficient key encapsulation to multiple parties. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 208–219. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  17. 17.
    Shoup, V.: A proposal for an ISO standard for public key encryption (version 2.1) (2001) (Preprint)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • M. Barbosa
    • 1
  • P. Farshim
    • 2
  1. 1.Departamento de InformáticaUniversidade do MinhoBragaPortugal
  2. 2.Department of Computer ScienceUniversity of BristolBristolUnited Kingdom

Personalised recommendations