Filters








67 Hits in 4.5 sec

Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions [chapter]

Brent Waters
2009 Lecture Notes in Computer Science  
These results are the first HIBE system and the first IBE system with short parameters under simple assumptions.  ...  Our techniques result in fully secure Identity-Based Encryption (IBE) and Hierarchical Identity-Based Encryption (HIBE) systems under the simple and established decisional Bilinear Diffie-Hellman and decisional  ...  Our techniques result in fully secure IBE and HIBE systems under the simple and established decisional Bilinear Diffie-Hellman and decisional Linear assumptions.  ... 
doi:10.1007/978-3-642-03356-8_36 fatcat:d3bc7cfsurawlphcxqfpyidiiy

Achieving Leakage Resilience through Dual System Encryption [chapter]

Allison Lewko, Yannis Rouselakis, Brent Waters
2011 Lecture Notes in Computer Science  
We demonstrate this concretely by providing fully secure IBE, HIBE, and ABE systems which are resilient to bounded leakage from each of many secret keys per user, as well as many master keys.  ...  Our systems are obtained by applying a simple modification to previous dual system encryption constructions: essentially this provides a generic tool for making dual system encryption schemes leakage-resilient  ...  Acknowledgments We are thankful to Joël Alwen and Yevgeniy Vahlis for useful observations.  ... 
doi:10.1007/978-3-642-19571-6_6 fatcat:sphqyprquvehjivaet5blzy5ra

New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts [chapter]

Allison Lewko, Brent Waters
2010 Lecture Notes in Computer Science  
To overcome this challenge, we design a new method for realizing dual system encryption.  ...  We construct a fully secure HIBE scheme with short ciphertexts.  ...  This 3-tuple is inspired by a simplification of the Waters dual encryption IBE system [5] . We prove security under 3 new static assumptions.  ... 
doi:10.1007/978-3-642-11799-2_27 fatcat:cyh6bfc3pvb3bfvasuvvrhkryu

Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More [chapter]

Nuttapong Attrapadung
2014 Lecture Notes in Computer Science  
However, there are still some FE for certain predicates to which dual system encryption techniques seem inapplicable, and hence their fully-secure realization remains an important problem.  ...  Dual system encryption techniques introduced by Waters in Crypto'09 are powerful approaches for constructing fully secure functional encryption (FE) for many predicates.  ...  I would like to thank Michel Abdalla, Takahiro Matsuda, Shota Yamada, and reviewers for their helpful comments on previous versions.  ... 
doi:10.1007/978-3-642-55220-5_31 fatcat:bogsnlvadvb25bga7lm4en3rxa

Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption [chapter]

Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters
2010 Lecture Notes in Computer Science  
We present two fully secure functional encryption schemes: a fully secure attribute-based encryption (ABE) scheme and a fully secure (attribute-hiding) predicate encryption (PE) scheme for inner-product  ...  In both cases, previous constructions were only proven to be selectively secure. Both results use novel strategies to adapt the dual system encryption methodology introduced by Waters.  ...  Waters [40] leveraged the dual system encryption methodology to obtain fully secure IBE and HIBE systems from simple assumptions.  ... 
doi:10.1007/978-3-642-13190-5_4 fatcat:sazrfsry65gpzh5bwxm2idfl7q

RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBE

Tung-Tso TSAI, Yuh-Min TSENG, Tsu-Yang WU
2014 Informatica  
Up to now, there was very little work on studying the revocation problem in existing hierarchical ID-based encryption (HIBE) systems.  ...  We demonstrate that the proposed RHIBE scheme is fully secure while removing the requirement of secure channels for private key updating in Boneh and Franklin's revocation method.  ...  ., under contract No. NSC100-2221-E-018-027.  ... 
doi:10.15388/informatica.2014.16 fatcat:7eaihyb7fneqvd3ipt3mx5pm2y

Expressive Encryption Systems from Lattices [chapter]

Xavier Boyen
2011 Lecture Notes in Computer Science  
In this survey, we review a number of the many "expressive" encryption systems that have recently appeared from lattices, and explore the innovative techniques that underpin them.  ...  The full version of [1] describes the fully secure system and its proof.  ...  to realize full homomorphism in his original system. 1 Around the same time, also appeared the first realization of "fully homomorphic encryption" [14] , a hugely significant breakthrough of both theoretical  ... 
doi:10.1007/978-3-642-25513-7_1 fatcat:pzyrmvtkpjhcjk6gq6yhcjm3xq

Fully, (Almost) Tightly Secure IBE and Dual System Groups [chapter]

Jie Chen, Hoeteck Wee
2013 Lecture Notes in Computer Science  
We present the first fully secure Identity-Based Encryption scheme (IBE) from the standard assumptions where the security loss depends only on the security parameter and is independent of the number of  ...  Along the way, we introduce a novel notion of dual system groups and a new randomization and parameter-hiding technique for prime-order bilinear groups.  ...  We thank Dennis Hofheinz and the anonymous reviewers for helpful feedback on the write-up.  ... 
doi:10.1007/978-3-642-40084-1_25 fatcat:tpffl4jfjfgr7h3zm2m23nnhza

Extended Nested Dual System Groups, Revisited [chapter]

Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao, Shaohua Tang
2016 Lecture Notes in Computer Science  
In particular, the dual system technique is now applied for establishing adaptive security of various types of functional encryptions, ranging from simple functionality, such as IBE [BKP14, CW14, JR13,  ...  without any additional assumption and full adaptive secure under the d-linear assumption. • We also try to provide better solution by fine-tuning ENDSG again and realizing it following the work of Chen  ...  In 2009, Waters [Wat09] proposed a new proof methodology, the dual system encryption, and presented an IBE scheme with short public key and proved its security under several simple assumptions in the  ... 
doi:10.1007/978-3-662-49384-7_6 fatcat:nbgaii2dzze7nnqbs45lxymlqu

ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption

Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya
2004 Proceedings of the 11th ACM conference on Computer and communications security - CCS '04  
A forward-secure public-key encryption scheme has recently been presented by Canetti, Halevi and Katz [13].  ...  The security of our schemes is based on the bilinear Diffie-Hellman assumption in the random oracle model.  ...  Gentry and Silverberg [22] extended BF-IBE scheme and presented a fully scalable hierarchical identity-based encryption (GS-HIBE) scheme.  ... 
doi:10.1145/1030083.1030130 dblp:conf/ccs/YaoFDL04 fatcat:eie6dpfsbbckhamncqa7lyakei

Forward-Secure Hierarchical Predicate Encryption

J. M. G. Nieto, M. Manulis, D. Sun
2013 Computer journal  
It realizes zero-inner-product predicates and is proven adaptively secure under standard assumptions.  ...  Furthermore, Okamoto and Takashima [28] investigated Functional Encryption that is adaptive security under standard assumptions.  ...  He wishes further to acknowledge support from the Center of Advanced Security Research Darmstadt (CASED) and the European Center for Security and Privacy by Design (EC SPRIDE).  ... 
doi:10.1093/comjnl/bxt029 fatcat:urvxkctw2fcnlikfjawnmmp6b4

Forward-Secure Hierarchical Predicate Encryption [chapter]

Juan Manuel González Nieto, Mark Manulis, Dongdong Sun
2013 Lecture Notes in Computer Science  
It realizes zero-inner-product predicates and is proven adaptively secure under standard assumptions.  ...  Furthermore, Okamoto and Takashima [28] investigated Functional Encryption that is adaptive security under standard assumptions.  ...  He wishes further to acknowledge support from the Center of Advanced Security Research Darmstadt (CASED) and the European Center for Security and Privacy by Design (EC SPRIDE).  ... 
doi:10.1007/978-3-642-36334-4_6 fatcat:weuhheo4jzdlpkuvup4fout6v4

Revocable hierarchical identity-based broadcast encryption

Dawei Li, Jianwei Liu, Zongyang Zhang, Qianhong Wu, Weiran Liu
2018 Tsinghua Science and Technology  
The unbounded version of the scheme is also shown to be secure but a little weaker than the former under the decisional n-Weak Bilinear Diffie-Hellman inversion assumption.  ...  Hierarchical Identity-Based Broadcast Encryption (HIBBE) organizes users into a tree-like structure, and it allows users to delegate their decryption ability to subordinates and enable encryption to any  ...  Waters [11] proposed the dual system encryption to realize fully secure HIBE under simple assumptions. Since then, many fully secure IBE and HIBE schemes have been constructed [11, 12, 17, 18] .  ... 
doi:10.26599/tst.2018.9010023 fatcat:aoiis52uyzckrhxkafj7cedeyy

A Novel Commutative Blinding Identity Based Encryption Scheme [chapter]

Yu Chen, Song Luo, Jianbin Hu, Zhong Chen
2012 Lecture Notes in Computer Science  
In CRYPTO 2009, Waters [28] proposed dual system encryption which resulted in fully secure IBE and HIBE systems under simple assumption and with compact public parameters.  ...  Motivation It is somewhat surprising to realize that BB 1 -IBE and Waters-IBE share the same framework but have quite different security results. The only  ...  IBE [1] , and direct CCA-secure 1 encryption [10] .  ... 
doi:10.1007/978-3-642-27901-0_7 fatcat:7umy3ejkhrcgjf5tneophen2ii

Fully Secure Doubly-Spatial Encryption under Simple Assumptions [chapter]

Cheng Chen, Zhenfeng Zhang, Dengguo Feng
2012 Lecture Notes in Computer Science  
Only a few spatial encryption schemes achieve adaptive security, but not under standard assumptions. And no fully secure doubly-spatial encryption scheme has been presented before.  ...  To the best of our knowledge, our second scheme is the first fully secure construction of doubly-spatial encryption. [1] keywords: spatial encryption, adaptive security, dual system encryption  ...  And later, dual system encryption used in [9] [10] [11] 13 ] to obtain adaptive security for IBE, HIBE, and ABE systems.  ... 
doi:10.1007/978-3-642-33272-2_16 fatcat:lixcqgytkfejbiel3tvcwg4kum
« Previous Showing results 1 — 15 out of 67 results