Skip to main content
Log in

Chosen ciphertext secure fuzzy identity based encryption without ROM

  • Published:
Journal of Shanghai Jiaotong University (Science) Aims and scope Submit manuscript

Abstract

Two new constructions of chosen-ciphertext secure fuzzy identity-based encryption (fuzzy-IBE) schemes without random oracle are proposed. The first scheme combines the modification of chosen-plaintext secure Sahai and Waters’ “large universe” construction and authenticated symmetric encryption, and uses consistency checking to handle with ill-formed ciphertexts to achieve chosen-ciphertext security in the selective ID model. The second scheme improves the efficiency of first scheme by eliminating consistency checking. This improved scheme is more efficient than existing chosen-ciphertext secure fuzzy-IBE scheme in the standard model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Shamir A. Identity-based cryptosystems and signature schemes [C]// In Proc CRYPTO 84. Berlin: Springer-Verlag, 1985: 47–53.

    Google Scholar 

  2. Boneh D, Franklin M K. Identity-based en-cryption from the Weil pairing [C]// In Proc the 21st Annual International Cryptology Confer-ence. Berlin: Springer-Verlag, 2001: 213–229.

    Google Scholar 

  3. Boneh D, Boyen X. Efficient selective-ID Identity based encryption without random oracles [C]// In Proc EUROCRYPT 2004. Berlin: Springer-Verlag, 2004: 223–238.

    Google Scholar 

  4. Boyen X. General ad hoc encryption from exponent inversion IBE [C]// In Proc EUROCRYPT 2007. Berlin: Springer-Verlag, 2007: 394–411.

    Chapter  Google Scholar 

  5. Gentry C. Practical identity-based encryption without random oracles [C]// In Proc EUROCRYPT 2006. Berlin: Springer-Verlag, 2006: 457–464.

    Google Scholar 

  6. Kiltz E, Vahlis Y. CCA2 secure IBE: Standard model efficiency through authenticated sym-metric encryption [C]// In Proc CT-RSA 2008. Berlin: Springer-Verlag, 2008: 221–238.

    Google Scholar 

  7. Waters B. Efficient identity based encryption without random oracles [C]// In Proc EUROCRYPT 2005. Berlin: Springer-Verlag, 2005: 114–127.

    Google Scholar 

  8. Sahai A, Waters B. Fuzzy identity-based encryption [C]// In Proc EUROCRYPT 2005. Berlin: Springer-Verlag, 2005: 457–473.

    Google Scholar 

  9. Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained ac-cess control of encrypted data [C]// In Proc CCS, 89-98. New York: ACM Press, 2006: 221–238.

    Google Scholar 

  10. Pirretti M, Traynor P, McDaniel P, et al. Secure attribute-based systems [C]// In Proc ACM CCS’06. New York: ACM Press, 2006: 99–112.

    Google Scholar 

  11. Baek J, Susilo W, Zhou J. New constructions of fuzzy identity-based encryption [C]// In Proc the 2nd ACM Symposium on Infor-mation, Computer and Communications Security. New York: ACM Press, 2007: 368–370.

    Chapter  Google Scholar 

  12. Chase M. Multi-authority attribute based encryption [C]// In Proc TCC 2007. Berlin: Springer-Verlag, 2007: 515–534.

    Google Scholar 

  13. Fujisaki E, Okamoto T. Secure integration of asymmetric and symmetric encryption schemes [C]// In Proc the 19th Annual Interna-tional Cryptology Conference on Advances in Cryptology. Berlin: Springer-Verlag, 1999: 537–554.

    Google Scholar 

  14. Canetti R, Goldreich O, Halevi S. The random oracle methodology [C]// In Proc in 30th ACM STOC. New York: ACM Press, 1998: 209–218.

    Google Scholar 

  15. Fang L, Wang J, Ren Y, et al. Chosen-ciphertext secure fuzzy identity-based key encapsulation without ROM [EB/OL]. http://eprint.iacr.org/, 2008.

  16. Hofheinz D, Kiltz E. Secure hybrid en-cryption from weakened key encapsulation [C]// In Proc CRYPTO 2007. Berlin: Springer-Verlag, 2007: 553–571.

    Chapter  Google Scholar 

  17. Kiltz E. Chosen-ciphertext secure key-encapsulation based on gap Hashed Diffie-Hellman [C]// In Proc PKC 2007. Berlin: Springer-Verlag, 2007: 282–297.

    Google Scholar 

  18. Kiltz E, Galindo D. Direct chosen-ciphertext secure identity-based key en-capsulation without random oracles [C]// In Proc ACISP 2006. Berlin: Springer-Verlag, 2006: 336–347.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li-ming Fang  (方黎明).

Additional information

Foundation item: the National High Technology Research and Development Program (863) of China (No. 2006AA12A106)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Fang, Lm., Wang, Jd., Ren, Yj. et al. Chosen ciphertext secure fuzzy identity based encryption without ROM. J. Shanghai Jiaotong Univ. (Sci.) 13, 646–650 (2008). https://doi.org/10.1007/s12204-008-0646-y

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12204-008-0646-y

Key words

CLC number

Navigation