Identity-Based Encryption Gone Wild

  • Michel Abdalla
  • Dario Catalano
  • Alexander W. Dent
  • John Malone-Lee
  • Gregory Neven
  • Nigel P. Smart
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4052)

Abstract

In this paper we introduce the notion of identity based encryption with wildcards, or WIBE for short. This allows the encryption of messages to multiple parties with common fields in their identity strings, for example email groups in a corporate hierarchy. We propose a full security notion and give efficient implementations meeting this notion in the standard model and in the random oracle model.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Abdalla, M., Catalano, D., Dent, A.W., Malone-Lee, J., Neven, G., Smart, N.P.: Identity-based encryption gone wild. In: Cryptology ePrint Archive (2006)Google Scholar
  2. 2.
    Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM CCS 1993, pp. 62–73 (1993)Google Scholar
  3. 3.
    Boneh, D., Boyen, X.: Efficient selective-ID secure identity based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223–238. Springer-Verlag, Heidelberg (2004)CrossRefGoogle Scholar
  4. 4.
    Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440–456. Springer-Verlag, Heidelberg (2005)CrossRefGoogle Scholar
  5. 5.
    Boneh, D., Franklin, M.K.: Identity based encryption from the Weil pairing. SIAM Journal on Computing 32(3), 586–615 (2003)MATHCrossRefMathSciNetGoogle Scholar
  6. 6.
    Halevi, S., Canetti, R., Katz, J.: Chosen-Ciphertext Security from Identity-Based Encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207–222. Springer-Verlag, Heidelberg (2004)CrossRefGoogle Scholar
  7. 7.
    Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360–363. Springer-Verlag, Heidelberg (2001)CrossRefGoogle Scholar
  8. 8.
    Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer-Verlag, Heidelberg (2002)CrossRefGoogle Scholar
  9. 9.
    Horwitz, J., Lynn, B.: Toward hierarchical identity-based encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 466–481. Springer-Verlag, Heidelberg (2002)CrossRefGoogle Scholar
  10. 10.
    Mitsunari, S., Saka, R., Kasahara, M.: A new traitor tracing. IEICE Transactions 85(2), 481–484 (2002)Google Scholar
  11. 11.
    Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. In: SCIS 2000, Okinawa, Japan (2000)Google Scholar
  12. 12.
    Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer-Verlag, Heidelberg (1985)CrossRefGoogle Scholar
  13. 13.
    Waters, B.R.: Efficient identity-based encryption without random oracles. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer-Verlag, Heidelberg (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Michel Abdalla
    • 1
  • Dario Catalano
    • 1
  • Alexander W. Dent
    • 2
  • John Malone-Lee
    • 3
  • Gregory Neven
    • 1
    • 4
  • Nigel P. Smart
    • 3
  1. 1.Département d’InformatiqueEcole Normale SupérieureParisFrance
  2. 2.Information Security Group, Royal HollowayUniversity of LondonEgham, SurreyUnited Kingdom
  3. 3.Department of Computer ScienceUniversity of BristolBristolUnited Kingdom
  4. 4.Department of Electrical EngineeringKatholieke Universiteit LeuvenHeverleeBelgium

Personalised recommendations