Hierarchical ID-Based Cryptography
We present hierarchical identity-based encryption schemes and signature schemes that have total collusion resistance on an arbitrary number of levels and that have chosen ciphertext security in the random oracle model assuming the difficulty of the Bilinear Diffie-Hellman problem.
Keywordsidentity-based cryptography hierarchical identity-based cryptography elliptic curves pairing-based cryptography
- 1.S. S. Al-Riyami and K. G. Paterson. Authenticated three party key agreement protocols from pairings. Cryptology e-Print Archive, http://eprint.iacr.org/2002/035/.
- 3.R. Blom. An optimal class of symmetric key generation systems, in Advances in Cryptology-Eurocrypt’ 84, Lecture Notes in Computer Science 209 (1984), Springer, 335–338.Google Scholar
- 4.C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung. Perfectly-secure key distribution for dynamic conferences, in Advances in Cryptology-Crypto’ 92, Lecture Notes in Computer Science 740 (1993), Springer, 471–486.Google Scholar
- 9.E. Fujisaki and T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes, in Advances in Cryptology-Crypto’ 99, Lecture Notes in Computer Science 1666 (1999), Springer, 537–554.Google Scholar
- 10.G. Hanaoka, T. Nishioka, Y. Zheng, and H. Imai. An efficient hierarchical identity-based key-sharing method resistant against collusion-attacks, in Advances in Cryptology-Asiacrypt 1999, Lecture Notes in Computer Science 1716 (1999), Springer, 348–362.Google Scholar
- 11.G. Hanaoka, T. Nishioka, Y. Zheng, and H. Imai, A hierarchical non-interactive key-sharing scheme with low memory size and high resistance against collusion attacks, to appear in The Computer Journal.Google Scholar
- 14.V. Miller. Short programs for functions on curves, unpublished manuscript.Google Scholar
- 16.R. Sakai, K. Ohgishi, and M. Kasahara. Cryptosystems based on pairing. SCIC 2000-C20, Okinawa, Japan, January 2000.Google Scholar
- 17.A. Shamir. Identity-based cryptosystems and signature schemes, in Advances in Cryptology-Crypto’ 84, Lecture Notes in Computer Science 196 (1984), Springer, 47–53.Google Scholar