skip to main content
10.1145/1368310.1368367acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Stateful identity-based encryption scheme: faster encryption and decryption

Published: 18 March 2008 Publication History

Abstract

In this paper, we first present the notion of stateful identity-based encryption (IBE) and then extend standard security definitions for IBE to the stateful setting. After that, we demonstrate a concrete stateful IBE scheme, whose security meets the strongest definition in the setting in random oracle model, and whose encryption and decryption are very efficient, compared to existing IBEs: one pairing each for encryption and decryption.

References

[1]
D. Boneh and X. Boyen, "Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles," EUROCRYPT 2004, LNCS 3027, Springer-Verlag, pp. 223--238, 2004.
[2]
M. Bellare, T. Kohno, and V. Shoup, "Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation," ACM CCS 2006. Full version available at http://eprint.iacr.org/2006/267.
[3]
M. Bellare, C. Namprempre, "Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm," ASIACRYPT 2000, pp. 531--545, 2000.
[4]
D. Boneh, M. Franklin, "Identity-Based Encryption from the Weil Pairing," SIAM J. of Compt., Vol. 32, No. 3, pp. 586--615, 2003.
[5]
M. Bellare and P. Rogaway, "Random oracles are practical: a paradigm for designing efficient protocols," 1st ACM Conference on Computer and Communications Security, pp. 62--73, 1993.
[6]
J. S. Coron, "On the exact security of Full Domain Hash", Proceedings of Crypto 2000, LNCS vol. 1880, Springer-Verlag, pp. 229--235, 2000.
[7]
R. Canetti, S. Halevi, and J. Katz, "A Forward-Secure Public-Key Encryption Scheme," Eurocrypt 2003, LNCS Vol. 2656, Springer-Verlag, pp. 255--271, 2003.
[8]
R. Cramer, V. Shoup, "Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack," SIAM J. of Comt., Vol. 33, pp.167--226, 2003.
[9]
E. Fujisaki, T. Okamoto, "Secure Integration of Asymmetric and Symmetric Encryption Schemes", Proc. of Crypto '99, LNCS 1666, Springer-Verlag, pp. 537--554, 1999.
[10]
D. Galindo, "Boneh-Franklin Identity Based Encryption Revisited," In ICALP'05, LNCS 3580, pp.791--802, 2005. Full version available from the author's homepage: http://www.cs.ru.nl/dgalindo/ICALP2005full.pdf.
[11]
K. Kurosawa and Y. Desmedt, "A New Paradigm of Hybrid Encryption Scheme," CRYPTO 2004, pp. 426--442, 2004.
[12]
V. Shoup, "Using hash functions as a hedge against chosen ciphertext attack," Eurocrypt'00, pp. 275--288, 2000.
[13]
V. Shoup, "Sequences of games: a tool for taming complexity in security proofs," manuscript, 2006. Available from http://www.shoup.net/papers/.

Cited By

View all

Index Terms

  1. Stateful identity-based encryption scheme: faster encryption and decryption

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security
      March 2008
      399 pages
      ISBN:9781595939791
      DOI:10.1145/1368310
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 18 March 2008

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. IBE
      2. ROM
      3. cryptography
      4. provable security
      5. stateful encryption

      Qualifiers

      • Research-article

      Conference

      Asia CCS '08
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 418 of 2,322 submissions, 18%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)5
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 22 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media