Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Paper 2005/258

Relations Among Notions of Security for Identity Based Encryption Schemes

Nuttapong Attrapadung, Yang Cui, Goichiro Hanaoka, Hideki Imai, Kanta Matsuura, Peng Yang, and Rui Zhang

Abstract

Identity based encryption (IBE) schemes have been flourishing since the very beginning of this century. In IBE it is widely believed that proving the security of a scheme in the sense of IND-ID-CCA2 is sufficient to claim the scheme is also secure in the senses of both SS-ID-CCA2 and NM-ID-CCA2. The justification for this belief is the relations among indistinguishability (IND), semantic security (SS) and non-malleability (NM). But these relations are proved only for conventional public key encryption (PKE) schemes in historical works. The fact is that between IBE and PKE, there exists a difference of special importance, i.e. only in IBE the adversaries can perform a particular attack, namely the chosen identity attack. This paper shows that security proved in the sense of IND-ID-CCA2 is validly sufficient for implying security in any other sense in IBE. This is to say the security notion, IND-ID-CCA2, captures the essence of security for all IBE schemes. To achieve this intention, we first describe formal definitions of the notions of security for IBE, and then present the relations among IND, SS and NM in IBE, along with rigorous proofs. All of these results are proposed with the consideration of the chosen identity attack.

Metadata
Available format(s)
PDF PS
Category
Foundations
Publication info
Published elsewhere. Unknown where it was published
Keywords
security notions
Contact author(s)
pengyang @ iis u-tokyo ac jp
History
2005-08-11: received
Short URL
https://ia.cr/2005/258
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2005/258,
      author = {Nuttapong Attrapadung and Yang Cui and Goichiro Hanaoka and Hideki Imai and Kanta Matsuura and Peng Yang and Rui Zhang},
      title = {Relations Among Notions of Security for Identity Based Encryption Schemes},
      howpublished = {Cryptology {ePrint} Archive, Paper 2005/258},
      year = {2005},
      url = {https://eprint.iacr.org/2005/258}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.