Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM
Uloženo v:
| Název: | Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM |
|---|---|
| Autoři: | Liming Fang, Ong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian |
| Přispěvatelé: | The Pennsylvania State University CiteSeerX Archives |
| Zdroj: | http://eprint.iacr.org/2008/139.pdf. |
| Sbírka: | CiteSeerX |
| Témata: | chosen-ciphertext security, hybrid encryption, fuzzy identity based encryption, key |
| Popis: | We use hybrid encryption with Fuzzy Identity-Based Encryption (Fuzzy-IBE) schemes, and present the first and efficient fuzzy identity-based key encapsulation mechanism (Fuzzy-IB-KEM) schemes which are chosen-ciphertext secure (CCA) without random oracle in the selective-ID model. To achieve these goals, we consider Fuzzy-IBE schemes as consisting of separate key and data encapsulation mechanisms (KEM-DEM), and then give the definition of Fuzzy-IB-KEM. Our main idea is to enhance Sahai and Waters ' "large universe " construction, chosen-plaintext secure (CPA) Fuzzy-IBE, by adding some redundant information to the ciphertext to make it CCA-secure. |
| Druh dokumentu: | text |
| Popis souboru: | application/pdf |
| Jazyk: | English |
| Relation: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.6209; http://eprint.iacr.org/2008/139.pdf |
| Dostupnost: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.6209 http://eprint.iacr.org/2008/139.pdf |
| Rights: | Metadata may be used without restrictions as long as the oai identifier remains attached to it. |
| Přístupové číslo: | edsbas.44E8468A |
| Databáze: | BASE |
| Abstrakt: | We use hybrid encryption with Fuzzy Identity-Based Encryption (Fuzzy-IBE) schemes, and present the first and efficient fuzzy identity-based key encapsulation mechanism (Fuzzy-IB-KEM) schemes which are chosen-ciphertext secure (CCA) without random oracle in the selective-ID model. To achieve these goals, we consider Fuzzy-IBE schemes as consisting of separate key and data encapsulation mechanisms (KEM-DEM), and then give the definition of Fuzzy-IB-KEM. Our main idea is to enhance Sahai and Waters ' "large universe " construction, chosen-plaintext secure (CPA) Fuzzy-IBE, by adding some redundant information to the ciphertext to make it CCA-secure. |
|---|
Nájsť tento článok vo Web of Science