Idealizing Identity-Based Encryption View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2015

AUTHORS

Dennis Hofheinz , Christian Matt , Ueli Maurer

ABSTRACT

We formalize the standard application of identity-based encryption (IBE), namely non-interactive secure communication, as realizing an ideal system which we call delivery controlled channel (DCC). This system allows users to be registered (by a central authority) for an identity and to send messages securely to other users only known by their identity.Quite surprisingly, we show that existing security definitions for IBE are not sufficient to realize DCC. In fact, it is impossible to do so in the standard model. We show, however, how to adjust any IBE scheme that satisfies the standard security definition IND-ID-CPA to achieve this goal in the random oracle model.We also show that the impossibility result can be avoided in the standard model by considering a weaker ideal system that requires all users to be registered in an initial phase before any messages are sent. To achieve this, a weaker security notion, which we introduce and call IND-ID1-CPA, is actually sufficient. This justifies our new security definition and might open the door for more efficient schemes. We further investigate which ideal systems can be realized with schemes satisfying the standard notion and variants of selective security.As a contribution of independent interest, we show how to model features of an ideal system that are potentially available to dishonest parties but not guaranteed, and which such features arise when using IBE. More... »

PAGES

495-520

Book

TITLE

Advances in Cryptology -- ASIACRYPT 2015

ISBN

978-3-662-48796-9
978-3-662-48797-6

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-662-48797-6_21

DOI

http://dx.doi.org/10.1007/978-3-662-48797-6_21

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1015521850


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany", 
          "id": "http://www.grid.ac/institutes/grid.7892.4", 
          "name": [
            "Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hofheinz", 
        "givenName": "Dennis", 
        "id": "sg:person.012613314054.34", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012613314054.34"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, ETH Zurich, Zurich, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5801.c", 
          "name": [
            "Department of Computer Science, ETH Zurich, Zurich, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Matt", 
        "givenName": "Christian", 
        "id": "sg:person.014520474132.60", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014520474132.60"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, ETH Zurich, Zurich, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5801.c", 
          "name": [
            "Department of Computer Science, ETH Zurich, Zurich, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Maurer", 
        "givenName": "Ueli", 
        "id": "sg:person.01316567627.91", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01316567627.91"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2015", 
    "datePublishedReg": "2015-01-01", 
    "description": "We formalize the standard application of identity-based encryption (IBE), namely non-interactive secure communication, as realizing an ideal system which we call delivery controlled channel (DCC). This system allows users to be registered (by a central authority) for an identity and to send messages securely to other users only known by their identity.Quite surprisingly, we show that existing security definitions for IBE are not sufficient to realize DCC. In fact, it is impossible to do so in the standard model. We show, however, how to adjust any IBE scheme that satisfies the standard security definition IND-ID-CPA to achieve this goal in the random oracle model.We also show that the impossibility result can be avoided in the standard model by considering a weaker ideal system that requires all users to be registered in an initial phase before any messages are sent. To achieve this, a weaker security notion, which we introduce and call IND-ID1-CPA, is actually sufficient. This justifies our new security definition and might open the door for more efficient schemes. We further investigate which ideal systems can be realized with schemes satisfying the standard notion and variants of selective security.As a contribution of independent interest, we show how to model features of an ideal system that are potentially available to dishonest parties but not guaranteed, and which such features arise when using IBE.", 
    "editor": [
      {
        "familyName": "Iwata", 
        "givenName": "Tetsu", 
        "type": "Person"
      }, 
      {
        "familyName": "Cheon", 
        "givenName": "Jung Hee", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-662-48797-6_21", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-662-48796-9", 
        "978-3-662-48797-6"
      ], 
      "name": "Advances in Cryptology -- ASIACRYPT 2015", 
      "type": "Book"
    }, 
    "keywords": [
      "identity-based encryption", 
      "security definitions", 
      "weaker security notion", 
      "random oracle model", 
      "new security definition", 
      "security notions", 
      "IBE scheme", 
      "oracle model", 
      "secure communication", 
      "selective security", 
      "IND-ID", 
      "dishonest party", 
      "efficient scheme", 
      "users", 
      "encryption", 
      "impossibility results", 
      "standard notion", 
      "independent interest", 
      "scheme", 
      "messages", 
      "such features", 
      "standard application", 
      "system", 
      "security", 
      "features", 
      "communication", 
      "standard model", 
      "model", 
      "definition", 
      "applications", 
      "ideal system", 
      "notion", 
      "goal", 
      "parties", 
      "door", 
      "channels", 
      "interest", 
      "results", 
      "variants", 
      "initial phase", 
      "fact", 
      "identity", 
      "contribution", 
      "delivery", 
      "CPA", 
      "phase", 
      "DCC"
    ], 
    "name": "Idealizing Identity-Based Encryption", 
    "pagination": "495-520", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1015521850"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-662-48797-6_21"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-662-48797-6_21", 
      "https://app.dimensions.ai/details/publication/pub.1015521850"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-10T10:47", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220509/entities/gbq_results/chapter/chapter_325.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-662-48797-6_21"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-48797-6_21'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-48797-6_21'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-48797-6_21'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-48797-6_21'


 

This table displays all metadata directly associated to this object as RDF triples.

129 TRIPLES      23 PREDICATES      73 URIs      66 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-662-48797-6_21 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N6505a8ff5be247c38c6c6ff4e1d1ec17
4 schema:datePublished 2015
5 schema:datePublishedReg 2015-01-01
6 schema:description We formalize the standard application of identity-based encryption (IBE), namely non-interactive secure communication, as realizing an ideal system which we call delivery controlled channel (DCC). This system allows users to be registered (by a central authority) for an identity and to send messages securely to other users only known by their identity.Quite surprisingly, we show that existing security definitions for IBE are not sufficient to realize DCC. In fact, it is impossible to do so in the standard model. We show, however, how to adjust any IBE scheme that satisfies the standard security definition IND-ID-CPA to achieve this goal in the random oracle model.We also show that the impossibility result can be avoided in the standard model by considering a weaker ideal system that requires all users to be registered in an initial phase before any messages are sent. To achieve this, a weaker security notion, which we introduce and call IND-ID1-CPA, is actually sufficient. This justifies our new security definition and might open the door for more efficient schemes. We further investigate which ideal systems can be realized with schemes satisfying the standard notion and variants of selective security.As a contribution of independent interest, we show how to model features of an ideal system that are potentially available to dishonest parties but not guaranteed, and which such features arise when using IBE.
7 schema:editor N107680ae38014168b40aee5f176c44cd
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf Nebe7bf31fa86499897bcf224e7c188bd
12 schema:keywords CPA
13 DCC
14 IBE scheme
15 IND-ID
16 applications
17 channels
18 communication
19 contribution
20 definition
21 delivery
22 dishonest party
23 door
24 efficient scheme
25 encryption
26 fact
27 features
28 goal
29 ideal system
30 identity
31 identity-based encryption
32 impossibility results
33 independent interest
34 initial phase
35 interest
36 messages
37 model
38 new security definition
39 notion
40 oracle model
41 parties
42 phase
43 random oracle model
44 results
45 scheme
46 secure communication
47 security
48 security definitions
49 security notions
50 selective security
51 standard application
52 standard model
53 standard notion
54 such features
55 system
56 users
57 variants
58 weaker security notion
59 schema:name Idealizing Identity-Based Encryption
60 schema:pagination 495-520
61 schema:productId N0d3e24ac122346bdb1e62a9a2f440938
62 N63314f27d0d647a995c151d3b209020b
63 schema:publisher Naaacb8c1ef7a4029ab72e3710de72ce8
64 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015521850
65 https://doi.org/10.1007/978-3-662-48797-6_21
66 schema:sdDatePublished 2022-05-10T10:47
67 schema:sdLicense https://scigraph.springernature.com/explorer/license/
68 schema:sdPublisher N60d41ab2e5234c3cb022bb32b0ffbaad
69 schema:url https://doi.org/10.1007/978-3-662-48797-6_21
70 sgo:license sg:explorer/license/
71 sgo:sdDataset chapters
72 rdf:type schema:Chapter
73 N0d3e24ac122346bdb1e62a9a2f440938 schema:name dimensions_id
74 schema:value pub.1015521850
75 rdf:type schema:PropertyValue
76 N107680ae38014168b40aee5f176c44cd rdf:first Ndab1fd968e8e428d883c92dd94637bcf
77 rdf:rest N837fa0a5ff0440d6894971281e50010b
78 N3f23aa5ba85b430e9a58c7781310a046 rdf:first sg:person.01316567627.91
79 rdf:rest rdf:nil
80 N432ddd5e6d324b1bb52e1fbfbc947393 rdf:first sg:person.014520474132.60
81 rdf:rest N3f23aa5ba85b430e9a58c7781310a046
82 N60d41ab2e5234c3cb022bb32b0ffbaad schema:name Springer Nature - SN SciGraph project
83 rdf:type schema:Organization
84 N63314f27d0d647a995c151d3b209020b schema:name doi
85 schema:value 10.1007/978-3-662-48797-6_21
86 rdf:type schema:PropertyValue
87 N6505a8ff5be247c38c6c6ff4e1d1ec17 rdf:first sg:person.012613314054.34
88 rdf:rest N432ddd5e6d324b1bb52e1fbfbc947393
89 N837fa0a5ff0440d6894971281e50010b rdf:first Nbeeba03136dd4aebb0384a5d400a9018
90 rdf:rest rdf:nil
91 Naaacb8c1ef7a4029ab72e3710de72ce8 schema:name Springer Nature
92 rdf:type schema:Organisation
93 Nbeeba03136dd4aebb0384a5d400a9018 schema:familyName Cheon
94 schema:givenName Jung Hee
95 rdf:type schema:Person
96 Ndab1fd968e8e428d883c92dd94637bcf schema:familyName Iwata
97 schema:givenName Tetsu
98 rdf:type schema:Person
99 Nebe7bf31fa86499897bcf224e7c188bd schema:isbn 978-3-662-48796-9
100 978-3-662-48797-6
101 schema:name Advances in Cryptology -- ASIACRYPT 2015
102 rdf:type schema:Book
103 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
104 schema:name Information and Computing Sciences
105 rdf:type schema:DefinedTerm
106 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
107 schema:name Data Format
108 rdf:type schema:DefinedTerm
109 sg:person.012613314054.34 schema:affiliation grid-institutes:grid.7892.4
110 schema:familyName Hofheinz
111 schema:givenName Dennis
112 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012613314054.34
113 rdf:type schema:Person
114 sg:person.01316567627.91 schema:affiliation grid-institutes:grid.5801.c
115 schema:familyName Maurer
116 schema:givenName Ueli
117 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01316567627.91
118 rdf:type schema:Person
119 sg:person.014520474132.60 schema:affiliation grid-institutes:grid.5801.c
120 schema:familyName Matt
121 schema:givenName Christian
122 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014520474132.60
123 rdf:type schema:Person
124 grid-institutes:grid.5801.c schema:alternateName Department of Computer Science, ETH Zurich, Zurich, Switzerland
125 schema:name Department of Computer Science, ETH Zurich, Zurich, Switzerland
126 rdf:type schema:Organization
127 grid-institutes:grid.7892.4 schema:alternateName Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany
128 schema:name Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany
129 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...