Zhengtao Jiang, Yong-Bin Wang, Wen Liu, Chen-guang Yang
{"title":"恒码双模型下的高效CCA安全HIBE方案","authors":"Zhengtao Jiang, Yong-Bin Wang, Wen Liu, Chen-guang Yang","doi":"10.1109/CSO.2010.56","DOIUrl":null,"url":null,"abstract":"Identity-based encryption schemes simplify the problem of the management and maintenance of digital certificates in the PKI environment. If the number of identities is large enough in a KGC (key generation center) domain, a single KGC will be a bottleneck of computation and communication. HIBE (Hierarchical identity-based encryption) has been introduced to solve this problem. For the present HIBEs, the size of public parameters is large and is twice as the number of hierarchy, and the analysis method is unique. Most of the existing HIBEs are either proved secure under RO (random oracle) model, or complicated and proved secure under standard mode. This paper further investigates both efficient and provably secure HIBE schemes with small public key size under multi-models. The size of public parameters of the proposed scheme is small and is independent of bit representation of an identity, and is about the same size as the number of hierarchy. The proposed scheme also has the advantage of constant size of cipher text, which is composed of 4 group elements. At last, the proposed scheme is proved sID-IND-CCA secure under both RO and standard models based on the standard DBDH problem. Investigations on the method of cryptographic scheme design and proof of security under multi-models can improve the confidence on its security.","PeriodicalId":427481,"journal":{"name":"2010 Third International Joint Conference on Computational Science and Optimization","volume":"218 6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Efficiently CCA Secure HIBE Schemes under Double Models with Constant Ciphersize\",\"authors\":\"Zhengtao Jiang, Yong-Bin Wang, Wen Liu, Chen-guang Yang\",\"doi\":\"10.1109/CSO.2010.56\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Identity-based encryption schemes simplify the problem of the management and maintenance of digital certificates in the PKI environment. If the number of identities is large enough in a KGC (key generation center) domain, a single KGC will be a bottleneck of computation and communication. HIBE (Hierarchical identity-based encryption) has been introduced to solve this problem. For the present HIBEs, the size of public parameters is large and is twice as the number of hierarchy, and the analysis method is unique. Most of the existing HIBEs are either proved secure under RO (random oracle) model, or complicated and proved secure under standard mode. This paper further investigates both efficient and provably secure HIBE schemes with small public key size under multi-models. The size of public parameters of the proposed scheme is small and is independent of bit representation of an identity, and is about the same size as the number of hierarchy. The proposed scheme also has the advantage of constant size of cipher text, which is composed of 4 group elements. At last, the proposed scheme is proved sID-IND-CCA secure under both RO and standard models based on the standard DBDH problem. Investigations on the method of cryptographic scheme design and proof of security under multi-models can improve the confidence on its security.\",\"PeriodicalId\":427481,\"journal\":{\"name\":\"2010 Third International Joint Conference on Computational Science and Optimization\",\"volume\":\"218 6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-05-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 Third International Joint Conference on Computational Science and Optimization\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSO.2010.56\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Third International Joint Conference on Computational Science and Optimization","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSO.2010.56","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Efficiently CCA Secure HIBE Schemes under Double Models with Constant Ciphersize
Identity-based encryption schemes simplify the problem of the management and maintenance of digital certificates in the PKI environment. If the number of identities is large enough in a KGC (key generation center) domain, a single KGC will be a bottleneck of computation and communication. HIBE (Hierarchical identity-based encryption) has been introduced to solve this problem. For the present HIBEs, the size of public parameters is large and is twice as the number of hierarchy, and the analysis method is unique. Most of the existing HIBEs are either proved secure under RO (random oracle) model, or complicated and proved secure under standard mode. This paper further investigates both efficient and provably secure HIBE schemes with small public key size under multi-models. The size of public parameters of the proposed scheme is small and is independent of bit representation of an identity, and is about the same size as the number of hierarchy. The proposed scheme also has the advantage of constant size of cipher text, which is composed of 4 group elements. At last, the proposed scheme is proved sID-IND-CCA secure under both RO and standard models based on the standard DBDH problem. Investigations on the method of cryptographic scheme design and proof of security under multi-models can improve the confidence on its security.