Single Private-Key Generator Security Implies Multiple Private-Key Generators Security View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2018-10-07

AUTHORS

Atsushi Fujioka , Kazuki Yoneyama

ABSTRACT

This paper discusses the security of identity-based cryptography with multiple private-key generators (mPKG-IBC). Most mPKG-IBC schemes and protocols are statically secure where private-key generators (PKGs) cannot control a binding between a party and its PKG. We propose adaptive security notions for identity-based key encapsulation mechanism with multiple private-key generators, identity-based signature with multiple private-key generators, and identity-based authenticated key exchange with multiple private-key generators, respectively. In additions, we provide their generic constructions of those from identity-based key encapsulation mechanism, identity-based signature, and identity-based authenticated key exchange which are secure in a single PKG model, respectively. More... »

PAGES

56-74

References to SciGraph publications

Book

TITLE

Provable Security

ISBN

978-3-030-01445-2
978-3-030-01446-9

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-030-01446-9_4

DOI

http://dx.doi.org/10.1007/978-3-030-01446-9_4

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1107463460


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Kanagawa University", 
          "id": "https://www.grid.ac/institutes/grid.411995.1", 
          "name": [
            "Kanagawa University, 3-27-1 Rokkakubashi, Kanagawa-ku, 221-8686, Yokohama-shi, Kanagawa, Japan"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Fujioka", 
        "givenName": "Atsushi", 
        "id": "sg:person.011650742644.26", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011650742644.26"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Ibaraki University", 
          "id": "https://www.grid.ac/institutes/grid.410773.6", 
          "name": [
            "Ibaraki University, 4-12-1 Nakanarusawa, 316-8511, Hitachi-shi, Ibaraki, Japan"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Yoneyama", 
        "givenName": "Kazuki", 
        "id": "sg:person.07431477636.33", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07431477636.33"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1145/1533057.1533101", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1014788570"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s10623-014-9972-2", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1034944734", 
          "https://doi.org/10.1007/s10623-014-9972-2"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-01440-6_23", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1036831577", 
          "https://doi.org/10.1007/978-3-642-01440-6_23"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-01440-6_23", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1036831577", 
          "https://doi.org/10.1007/978-3-642-01440-6_23"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-47721-7_12", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1038535610", 
          "https://doi.org/10.1007/3-540-47721-7_12"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1002/sec.743", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1043893468"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1137/s0097539701398521", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1062879340"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-61273-7_21", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1090662702", 
          "https://doi.org/10.1007/978-3-319-61273-7_21"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-64200-0_12", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1090965456", 
          "https://doi.org/10.1007/978-3-319-64200-0_12"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-64200-0_12", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1090965456", 
          "https://doi.org/10.1007/978-3-319-64200-0_12"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/glocom.2008.ecp.360", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094069343"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/csfw.2003.1212715", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094876859"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2018-10-07", 
    "datePublishedReg": "2018-10-07", 
    "description": "This paper discusses the security of identity-based cryptography with multiple private-key generators (mPKG-IBC). Most mPKG-IBC schemes and protocols are statically secure where private-key generators (PKGs) cannot control a binding between a party and its PKG. We propose adaptive security notions for identity-based key encapsulation mechanism with multiple private-key generators, identity-based signature with multiple private-key generators, and identity-based authenticated key exchange with multiple private-key generators, respectively. In additions, we provide their generic constructions of those from identity-based key encapsulation mechanism, identity-based signature, and identity-based authenticated key exchange which are secure in a single PKG model, respectively.", 
    "editor": [
      {
        "familyName": "Baek", 
        "givenName": "Joonsang", 
        "type": "Person"
      }, 
      {
        "familyName": "Susilo", 
        "givenName": "Willy", 
        "type": "Person"
      }, 
      {
        "familyName": "Kim", 
        "givenName": "Jongkil", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-030-01446-9_4", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-030-01445-2", 
        "978-3-030-01446-9"
      ], 
      "name": "Provable Security", 
      "type": "Book"
    }, 
    "name": "Single Private-Key Generator Security Implies Multiple Private-Key Generators Security", 
    "pagination": "56-74", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-030-01446-9_4"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "b5c2fe222d3da716ea6a42ea8cba60b9fd431ce0c2cd69439155460347cb8aff"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1107463460"
        ]
      }
    ], 
    "publisher": {
      "location": "Cham", 
      "name": "Springer International Publishing", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-030-01446-9_4", 
      "https://app.dimensions.ai/details/publication/pub.1107463460"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-16T04:38", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000321_0000000321/records_74902_00000000.jsonl", 
    "type": "Chapter", 
    "url": "https://link.springer.com/10.1007%2F978-3-030-01446-9_4"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-01446-9_4'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-01446-9_4'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-01446-9_4'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-01446-9_4'


 

This table displays all metadata directly associated to this object as RDF triples.

120 TRIPLES      23 PREDICATES      36 URIs      19 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-030-01446-9_4 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N10e9df47c85b4723a5d412381c3aef2b
4 schema:citation sg:pub.10.1007/3-540-47721-7_12
5 sg:pub.10.1007/978-3-319-61273-7_21
6 sg:pub.10.1007/978-3-319-64200-0_12
7 sg:pub.10.1007/978-3-642-01440-6_23
8 sg:pub.10.1007/s10623-014-9972-2
9 https://doi.org/10.1002/sec.743
10 https://doi.org/10.1109/csfw.2003.1212715
11 https://doi.org/10.1109/glocom.2008.ecp.360
12 https://doi.org/10.1137/s0097539701398521
13 https://doi.org/10.1145/1533057.1533101
14 schema:datePublished 2018-10-07
15 schema:datePublishedReg 2018-10-07
16 schema:description This paper discusses the security of identity-based cryptography with multiple private-key generators (mPKG-IBC). Most mPKG-IBC schemes and protocols are statically secure where private-key generators (PKGs) cannot control a binding between a party and its PKG. We propose adaptive security notions for identity-based key encapsulation mechanism with multiple private-key generators, identity-based signature with multiple private-key generators, and identity-based authenticated key exchange with multiple private-key generators, respectively. In additions, we provide their generic constructions of those from identity-based key encapsulation mechanism, identity-based signature, and identity-based authenticated key exchange which are secure in a single PKG model, respectively.
17 schema:editor N51f60496517947bbac59d85083cc0523
18 schema:genre chapter
19 schema:inLanguage en
20 schema:isAccessibleForFree false
21 schema:isPartOf Nd397d0981c90411faea253949d641a3f
22 schema:name Single Private-Key Generator Security Implies Multiple Private-Key Generators Security
23 schema:pagination 56-74
24 schema:productId N77d2d71eec6346ce8cd326975d4ddd3d
25 N82a7bb6d9dbd4da7b13160fb58ee405d
26 N9e5d007e0f9843148ac847e4075f1a01
27 schema:publisher N44b5d86b25074ab1a6d9700b01368743
28 schema:sameAs https://app.dimensions.ai/details/publication/pub.1107463460
29 https://doi.org/10.1007/978-3-030-01446-9_4
30 schema:sdDatePublished 2019-04-16T04:38
31 schema:sdLicense https://scigraph.springernature.com/explorer/license/
32 schema:sdPublisher N559ea433676b453da15cb43004e59d0a
33 schema:url https://link.springer.com/10.1007%2F978-3-030-01446-9_4
34 sgo:license sg:explorer/license/
35 sgo:sdDataset chapters
36 rdf:type schema:Chapter
37 N10e9df47c85b4723a5d412381c3aef2b rdf:first sg:person.011650742644.26
38 rdf:rest N19df3e47b2434f188a08fafb3a792e57
39 N19df3e47b2434f188a08fafb3a792e57 rdf:first sg:person.07431477636.33
40 rdf:rest rdf:nil
41 N353e2089c46e489190c8865802c94d1f schema:familyName Kim
42 schema:givenName Jongkil
43 rdf:type schema:Person
44 N4066f762ff8c42219fdf9740fac1bf0a schema:familyName Baek
45 schema:givenName Joonsang
46 rdf:type schema:Person
47 N44b5d86b25074ab1a6d9700b01368743 schema:location Cham
48 schema:name Springer International Publishing
49 rdf:type schema:Organisation
50 N51f60496517947bbac59d85083cc0523 rdf:first N4066f762ff8c42219fdf9740fac1bf0a
51 rdf:rest N771efae14a7d411ba293349d2f6ea15d
52 N549420b60ad846fb924b326e0d707dec schema:familyName Susilo
53 schema:givenName Willy
54 rdf:type schema:Person
55 N559ea433676b453da15cb43004e59d0a schema:name Springer Nature - SN SciGraph project
56 rdf:type schema:Organization
57 N771efae14a7d411ba293349d2f6ea15d rdf:first N549420b60ad846fb924b326e0d707dec
58 rdf:rest N95e5a42d2c1943dbb7e9cfd0fbcc805d
59 N77d2d71eec6346ce8cd326975d4ddd3d schema:name dimensions_id
60 schema:value pub.1107463460
61 rdf:type schema:PropertyValue
62 N82a7bb6d9dbd4da7b13160fb58ee405d schema:name readcube_id
63 schema:value b5c2fe222d3da716ea6a42ea8cba60b9fd431ce0c2cd69439155460347cb8aff
64 rdf:type schema:PropertyValue
65 N95e5a42d2c1943dbb7e9cfd0fbcc805d rdf:first N353e2089c46e489190c8865802c94d1f
66 rdf:rest rdf:nil
67 N9e5d007e0f9843148ac847e4075f1a01 schema:name doi
68 schema:value 10.1007/978-3-030-01446-9_4
69 rdf:type schema:PropertyValue
70 Nd397d0981c90411faea253949d641a3f schema:isbn 978-3-030-01445-2
71 978-3-030-01446-9
72 schema:name Provable Security
73 rdf:type schema:Book
74 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
75 schema:name Information and Computing Sciences
76 rdf:type schema:DefinedTerm
77 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
78 schema:name Data Format
79 rdf:type schema:DefinedTerm
80 sg:person.011650742644.26 schema:affiliation https://www.grid.ac/institutes/grid.411995.1
81 schema:familyName Fujioka
82 schema:givenName Atsushi
83 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011650742644.26
84 rdf:type schema:Person
85 sg:person.07431477636.33 schema:affiliation https://www.grid.ac/institutes/grid.410773.6
86 schema:familyName Yoneyama
87 schema:givenName Kazuki
88 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07431477636.33
89 rdf:type schema:Person
90 sg:pub.10.1007/3-540-47721-7_12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038535610
91 https://doi.org/10.1007/3-540-47721-7_12
92 rdf:type schema:CreativeWork
93 sg:pub.10.1007/978-3-319-61273-7_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1090662702
94 https://doi.org/10.1007/978-3-319-61273-7_21
95 rdf:type schema:CreativeWork
96 sg:pub.10.1007/978-3-319-64200-0_12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1090965456
97 https://doi.org/10.1007/978-3-319-64200-0_12
98 rdf:type schema:CreativeWork
99 sg:pub.10.1007/978-3-642-01440-6_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1036831577
100 https://doi.org/10.1007/978-3-642-01440-6_23
101 rdf:type schema:CreativeWork
102 sg:pub.10.1007/s10623-014-9972-2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034944734
103 https://doi.org/10.1007/s10623-014-9972-2
104 rdf:type schema:CreativeWork
105 https://doi.org/10.1002/sec.743 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043893468
106 rdf:type schema:CreativeWork
107 https://doi.org/10.1109/csfw.2003.1212715 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094876859
108 rdf:type schema:CreativeWork
109 https://doi.org/10.1109/glocom.2008.ecp.360 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094069343
110 rdf:type schema:CreativeWork
111 https://doi.org/10.1137/s0097539701398521 schema:sameAs https://app.dimensions.ai/details/publication/pub.1062879340
112 rdf:type schema:CreativeWork
113 https://doi.org/10.1145/1533057.1533101 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014788570
114 rdf:type schema:CreativeWork
115 https://www.grid.ac/institutes/grid.410773.6 schema:alternateName Ibaraki University
116 schema:name Ibaraki University, 4-12-1 Nakanarusawa, 316-8511, Hitachi-shi, Ibaraki, Japan
117 rdf:type schema:Organization
118 https://www.grid.ac/institutes/grid.411995.1 schema:alternateName Kanagawa University
119 schema:name Kanagawa University, 3-27-1 Rokkakubashi, Kanagawa-ku, 221-8686, Yokohama-shi, Kanagawa, Japan
120 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...