Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM
Saved in:
| Title: | Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM |
|---|---|
| Authors: | Liming Fang, Ong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian |
| Contributors: | The Pennsylvania State University CiteSeerX Archives |
| Source: | http://eprint.iacr.org/2008/139.pdf. |
| Collection: | CiteSeerX |
| Subject Terms: | chosen-ciphertext security, hybrid encryption, fuzzy identity based encryption, key |
| Description: | We use hybrid encryption with Fuzzy Identity-Based Encryption (Fuzzy-IBE) schemes, and present the first and efficient fuzzy identity-based key encapsulation mechanism (Fuzzy-IB-KEM) schemes which are chosen-ciphertext secure (CCA) without random oracle in the selective-ID model. To achieve these goals, we consider Fuzzy-IBE schemes as consisting of separate key and data encapsulation mechanisms (KEM-DEM), and then give the definition of Fuzzy-IB-KEM. Our main idea is to enhance Sahai and Waters ' "large universe " construction, chosen-plaintext secure (CPA) Fuzzy-IBE, by adding some redundant information to the ciphertext to make it CCA-secure. |
| Document Type: | text |
| File Description: | application/pdf |
| Language: | English |
| Relation: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.6209; http://eprint.iacr.org/2008/139.pdf |
| Availability: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.6209 http://eprint.iacr.org/2008/139.pdf |
| Rights: | Metadata may be used without restrictions as long as the oai identifier remains attached to it. |
| Accession Number: | edsbas.44E8468A |
| Database: | BASE |
Be the first to leave a comment!
Nájsť tento článok vo Web of Science