...
首页> 外文期刊>Designs, Codes and Crytography >Efficient hybrid encryption from ID-based encryption
【24h】

Efficient hybrid encryption from ID-based encryption

机译:基于ID的加密的高效混合加密

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

This paper deals with generic transformations from ID-based key encapsulation mechanisms (IBKEM) to hybrid public-key encryption (PKE). The best generic transformation known until now is by Boneh and Katz and requires roughly 704-bit overhead in the ciphertext. We present new generic transformations that are applicable to partitioned IBKEMs. A partitioned IBKEM is an IBKEM that provides some extra structure. Such IBKEMs are quite natural and in fact nearly all known IBKEMs have this additional property. Our first transformation yields chosen-ciphertext secure PKE schemes from selective-ID secure partitioned IBKEMs with a 256-bit overhead in ciphertext size plus one extra exponentiation in encryption/decryption. As the central tool a Chameleon Hash function is used to map the identities. We also propose other methods to remove the use of Chameleon Hash, which may be of independent technical interest. Applying our transformations to existing IBKEMs we propose a number of novel PKE schemes with different trade-offs. In some concrete instantiations the Chameleon Hash can be made "implicit" which results in improved efficiency by eliminating the additional exponentiation. Since our transformations preservernthe public verifiability property of the IBE schemes it is possible to extend our results to build threshold hybrid PKE schemes. We show an analogue generic transformation in the threshold setting and present a concrete scheme which results in the most efficient threshold PKE scheme in the standard model.
机译:本文讨论了从基于ID的密钥封装机制(IBKEM)到混合公共密钥加密(PKE)的一般转换。到目前为止,已知的最佳通用转换是Boneh和Katz进行的,并且密文需要大约704位的开销。我们提出了适用于分区IBKEM的新通用转换。分区的IBKEM是提供一些额外结构的IBKEM。这样的IBKEM非常自然,实际上几乎所有已知的IBKEM都具有此附加属性。我们的第一个转换从选择性ID安全分区的IBKEM生成了密文安全的PKE方案,密文大小为256位,另外还加了一个加密/解密指数。 Chameleon哈希函数作为中心工具,用于映射身份。我们还提出了其他方法来取消对Chameleon Hash的使用,这可能具有独立的技术意义。将我们的转换应用于现有的IBKEM,我们提出了许多具有不同权衡取舍的新颖PKE方案。在某些具体实例中,可以使“变色龙哈希”成为“隐式”,这通过消除附加的幂运算来提高效率。由于我们的转换保留了IBE方案的公共可验证性,因此有可能将我们的结果扩展为构建阈值混合PKE方案。我们在阈值设置中显示了一个模拟通用转换,并提出了一种导致标准模型中最有效的阈值PKE方案的具体方案。

著录项

  • 来源
    《Designs, Codes and Crytography》 |2010年第3期|205-240|共36页
  • 作者单位

    Information Sharing Platform Laboratories, NTT, 3-9-11 Midori-cho, Musashino-shi, Tokyo 180-8585, Japan;

    Research Center for Information Security (RCIS), AIST, 1 -18-13 Sotokanda, Chiyoda-ku, Tokyo 101-0021, Japan;

    Chuo University, 1-13-27 Kasuga, Bunkyo-ku, Tokyo 112-8551, Japan;

    CWI Amsterdam, P.O. Box 94079, 1090 GB Amsterdam, The Netherlands;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    hybrid encryption; selective-ID; KEM; threshold PKE; chameleon hash;

    机译:混合加密;选择ID;KEM;门限PKE;变色龙哈希;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号