Abstract
Two new constructions of chosen-ciphertext secure fuzzy identity-based encryption (fuzzy-IBE) schemes without random oracle are proposed. The first scheme combines the modification of chosen-plaintext secure Sahai and Waters’ “large universe” construction and authenticated symmetric encryption, and uses consistency checking to handle with ill-formed ciphertexts to achieve chosen-ciphertext security in the selective ID model. The second scheme improves the efficiency of first scheme by eliminating consistency checking. This improved scheme is more efficient than existing chosen-ciphertext secure fuzzy-IBE scheme in the standard model.
Similar content being viewed by others
References
Shamir A. Identity-based cryptosystems and signature schemes [C]// In Proc CRYPTO 84. Berlin: Springer-Verlag, 1985: 47–53.
Boneh D, Franklin M K. Identity-based en-cryption from the Weil pairing [C]// In Proc the 21st Annual International Cryptology Confer-ence. Berlin: Springer-Verlag, 2001: 213–229.
Boneh D, Boyen X. Efficient selective-ID Identity based encryption without random oracles [C]// In Proc EUROCRYPT 2004. Berlin: Springer-Verlag, 2004: 223–238.
Boyen X. General ad hoc encryption from exponent inversion IBE [C]// In Proc EUROCRYPT 2007. Berlin: Springer-Verlag, 2007: 394–411.
Gentry C. Practical identity-based encryption without random oracles [C]// In Proc EUROCRYPT 2006. Berlin: Springer-Verlag, 2006: 457–464.
Kiltz E, Vahlis Y. CCA2 secure IBE: Standard model efficiency through authenticated sym-metric encryption [C]// In Proc CT-RSA 2008. Berlin: Springer-Verlag, 2008: 221–238.
Waters B. Efficient identity based encryption without random oracles [C]// In Proc EUROCRYPT 2005. Berlin: Springer-Verlag, 2005: 114–127.
Sahai A, Waters B. Fuzzy identity-based encryption [C]// In Proc EUROCRYPT 2005. Berlin: Springer-Verlag, 2005: 457–473.
Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained ac-cess control of encrypted data [C]// In Proc CCS, 89-98. New York: ACM Press, 2006: 221–238.
Pirretti M, Traynor P, McDaniel P, et al. Secure attribute-based systems [C]// In Proc ACM CCS’06. New York: ACM Press, 2006: 99–112.
Baek J, Susilo W, Zhou J. New constructions of fuzzy identity-based encryption [C]// In Proc the 2nd ACM Symposium on Infor-mation, Computer and Communications Security. New York: ACM Press, 2007: 368–370.
Chase M. Multi-authority attribute based encryption [C]// In Proc TCC 2007. Berlin: Springer-Verlag, 2007: 515–534.
Fujisaki E, Okamoto T. Secure integration of asymmetric and symmetric encryption schemes [C]// In Proc the 19th Annual Interna-tional Cryptology Conference on Advances in Cryptology. Berlin: Springer-Verlag, 1999: 537–554.
Canetti R, Goldreich O, Halevi S. The random oracle methodology [C]// In Proc in 30th ACM STOC. New York: ACM Press, 1998: 209–218.
Fang L, Wang J, Ren Y, et al. Chosen-ciphertext secure fuzzy identity-based key encapsulation without ROM [EB/OL]. http://eprint.iacr.org/, 2008.
Hofheinz D, Kiltz E. Secure hybrid en-cryption from weakened key encapsulation [C]// In Proc CRYPTO 2007. Berlin: Springer-Verlag, 2007: 553–571.
Kiltz E. Chosen-ciphertext secure key-encapsulation based on gap Hashed Diffie-Hellman [C]// In Proc PKC 2007. Berlin: Springer-Verlag, 2007: 282–297.
Kiltz E, Galindo D. Direct chosen-ciphertext secure identity-based key en-capsulation without random oracles [C]// In Proc ACISP 2006. Berlin: Springer-Verlag, 2006: 336–347.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: the National High Technology Research and Development Program (863) of China (No. 2006AA12A106)
Rights and permissions
About this article
Cite this article
Fang, Lm., Wang, Jd., Ren, Yj. et al. Chosen ciphertext secure fuzzy identity based encryption without ROM. J. Shanghai Jiaotong Univ. (Sci.) 13, 646–650 (2008). https://doi.org/10.1007/s12204-008-0646-y
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12204-008-0646-y