Team for Research in
Ubiquitous Secure Technology

• Chosen-Ciphertext Security from Identity-Based Encryption
D. Boneh, R. Canetti, S. Halevi, J. Katz

Citation
D. Boneh, R. Canetti, S. Halevi, J. Katz. "• Chosen-Ciphertext Security from Identity-Based Encryption". SIAM J. of Computing, 915-942, 2006.

Abstract
We propose simple and efficient "CCA-secure" public-key encryption schemes (i.e., schemes secure against adaptive chosen-ciphertext attacks) based on any identity-based encryption (IBE) scheme. When instantiated with known IBE schemes, our constructions have ramifications of both theoretical and practical interest. First, our schemes give a new paradigm for achieving CCA-security; this paradigm avoids "proofs of well-formedness" that have been shown to underlie all previous constructions. Second, using efficient IBE constructions we obtain CCA-secure encryption schemes whose performance is competitive with the best provably-secure solutions to date. Our techniques extend naturally to give an efficient method for securing any hierarchical IBE scheme against adaptive chosen-ciphertext attacks. Coupled with previous work, this gives the most efficient known constructions of CCA-secure IBE schemes. Reference:

Electronic downloads

Citation formats  
  • HTML
    D. Boneh, R. Canetti, S. Halevi, J. Katz. <a
    href="http://www.truststc.org/pubs/604.html"
    >•	Chosen-Ciphertext Security from
    Identity-Based Encryption</a>, SIAM J. of Computing,
    915-942, 2006.
  • Plain text
    D. Boneh, R. Canetti, S. Halevi, J. Katz.
    "•	Chosen-Ciphertext Security from
    Identity-Based Encryption". SIAM J. of Computing,
    915-942, 2006.
  • BibTeX
    @inproceedings{BonehCanettiHaleviKatz06_ChosenCiphertextSecurityFromIdentityBasedEncryption,
        author = {D. Boneh and R. Canetti and S. Halevi and J. Katz},
        title = {•	Chosen-Ciphertext Security from Identity-Based
                  Encryption},
        booktitle = {SIAM J. of Computing},
        pages = {915-942},
        year = {2006},
        abstract = {We propose simple and efficient "CCA-secure"
                  public-key encryption schemes (i.e., schemes
                  secure against adaptive chosen-ciphertext attacks)
                  based on any identity-based encryption (IBE)
                  scheme. When instantiated with known IBE schemes,
                  our constructions have ramifications of both
                  theoretical and practical interest. First, our
                  schemes give a new paradigm for achieving
                  CCA-security; this paradigm avoids "proofs of
                  well-formedness" that have been shown to underlie
                  all previous constructions. Second, using
                  efficient IBE constructions we obtain CCA-secure
                  encryption schemes whose performance is
                  competitive with the best provably-secure
                  solutions to date. Our techniques extend naturally
                  to give an efficient method for securing any
                  hierarchical IBE scheme against adaptive
                  chosen-ciphertext attacks. Coupled with previous
                  work, this gives the most efficient known
                  constructions of CCA-secure IBE schemes.
                  Reference: },
        URL = {http://www.truststc.org/pubs/604.html}
    }
    

Posted by Jessica Gamble on 16 Mar 2009.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.