2015
AUTHORSDennis Hofheinz , Christian Matt , Ueli Maurer
ABSTRACTWe formalize the standard application of identity-based encryption (IBE), namely non-interactive secure communication, as realizing an ideal system which we call delivery controlled channel (DCC). This system allows users to be registered (by a central authority) for an identity and to send messages securely to other users only known by their identity.Quite surprisingly, we show that existing security definitions for IBE are not sufficient to realize DCC. In fact, it is impossible to do so in the standard model. We show, however, how to adjust any IBE scheme that satisfies the standard security definition IND-ID-CPA to achieve this goal in the random oracle model.We also show that the impossibility result can be avoided in the standard model by considering a weaker ideal system that requires all users to be registered in an initial phase before any messages are sent. To achieve this, a weaker security notion, which we introduce and call IND-ID1-CPA, is actually sufficient. This justifies our new security definition and might open the door for more efficient schemes. We further investigate which ideal systems can be realized with schemes satisfying the standard notion and variants of selective security.As a contribution of independent interest, we show how to model features of an ideal system that are potentially available to dishonest parties but not guaranteed, and which such features arise when using IBE. More... »
PAGES495-520
Advances in Cryptology -- ASIACRYPT 2015
ISBN
978-3-662-48796-9
978-3-662-48797-6
http://scigraph.springernature.com/pub.10.1007/978-3-662-48797-6_21
DOIhttp://dx.doi.org/10.1007/978-3-662-48797-6_21
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1015521850
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Data Format",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany",
"id": "http://www.grid.ac/institutes/grid.7892.4",
"name": [
"Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany"
],
"type": "Organization"
},
"familyName": "Hofheinz",
"givenName": "Dennis",
"id": "sg:person.012613314054.34",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012613314054.34"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Department of Computer Science, ETH Zurich, Zurich, Switzerland",
"id": "http://www.grid.ac/institutes/grid.5801.c",
"name": [
"Department of Computer Science, ETH Zurich, Zurich, Switzerland"
],
"type": "Organization"
},
"familyName": "Matt",
"givenName": "Christian",
"id": "sg:person.014520474132.60",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014520474132.60"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Department of Computer Science, ETH Zurich, Zurich, Switzerland",
"id": "http://www.grid.ac/institutes/grid.5801.c",
"name": [
"Department of Computer Science, ETH Zurich, Zurich, Switzerland"
],
"type": "Organization"
},
"familyName": "Maurer",
"givenName": "Ueli",
"id": "sg:person.01316567627.91",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01316567627.91"
],
"type": "Person"
}
],
"datePublished": "2015",
"datePublishedReg": "2015-01-01",
"description": "We formalize the standard application of identity-based encryption (IBE), namely non-interactive secure communication, as realizing an ideal system which we call delivery controlled channel (DCC). This system allows users to be registered (by a central authority) for an identity and to send messages securely to other users only known by their identity.Quite surprisingly, we show that existing security definitions for IBE are not sufficient to realize DCC. In fact, it is impossible to do so in the standard model. We show, however, how to adjust any IBE scheme that satisfies the standard security definition IND-ID-CPA to achieve this goal in the random oracle model.We also show that the impossibility result can be avoided in the standard model by considering a weaker ideal system that requires all users to be registered in an initial phase before any messages are sent. To achieve this, a weaker security notion, which we introduce and call IND-ID1-CPA, is actually sufficient. This justifies our new security definition and might open the door for more efficient schemes. We further investigate which ideal systems can be realized with schemes satisfying the standard notion and variants of selective security.As a contribution of independent interest, we show how to model features of an ideal system that are potentially available to dishonest parties but not guaranteed, and which such features arise when using IBE.",
"editor": [
{
"familyName": "Iwata",
"givenName": "Tetsu",
"type": "Person"
},
{
"familyName": "Cheon",
"givenName": "Jung Hee",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/978-3-662-48797-6_21",
"inLanguage": "en",
"isAccessibleForFree": true,
"isPartOf": {
"isbn": [
"978-3-662-48796-9",
"978-3-662-48797-6"
],
"name": "Advances in Cryptology -- ASIACRYPT 2015",
"type": "Book"
},
"keywords": [
"identity-based encryption",
"security definitions",
"weaker security notion",
"random oracle model",
"new security definition",
"security notions",
"IBE scheme",
"oracle model",
"secure communication",
"selective security",
"IND-ID",
"dishonest party",
"efficient scheme",
"users",
"encryption",
"impossibility results",
"standard notion",
"independent interest",
"scheme",
"messages",
"such features",
"standard application",
"system",
"security",
"features",
"communication",
"standard model",
"model",
"definition",
"applications",
"ideal system",
"notion",
"goal",
"parties",
"door",
"channels",
"interest",
"results",
"variants",
"initial phase",
"fact",
"identity",
"contribution",
"delivery",
"CPA",
"phase",
"DCC"
],
"name": "Idealizing Identity-Based Encryption",
"pagination": "495-520",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1015521850"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/978-3-662-48797-6_21"
]
}
],
"publisher": {
"name": "Springer Nature",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/978-3-662-48797-6_21",
"https://app.dimensions.ai/details/publication/pub.1015521850"
],
"sdDataset": "chapters",
"sdDatePublished": "2022-05-10T10:47",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220509/entities/gbq_results/chapter/chapter_325.jsonl",
"type": "Chapter",
"url": "https://doi.org/10.1007/978-3-662-48797-6_21"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-48797-6_21'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-48797-6_21'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-48797-6_21'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-48797-6_21'
This table displays all metadata directly associated to this object as RDF triples.
129 TRIPLES
23 PREDICATES
73 URIs
66 LITERALS
7 BLANK NODES
Subject | Predicate | Object | |
---|---|---|---|
1 | sg:pub.10.1007/978-3-662-48797-6_21 | schema:about | anzsrc-for:08 |
2 | ″ | ″ | anzsrc-for:0804 |
3 | ″ | schema:author | N6505a8ff5be247c38c6c6ff4e1d1ec17 |
4 | ″ | schema:datePublished | 2015 |
5 | ″ | schema:datePublishedReg | 2015-01-01 |
6 | ″ | schema:description | We formalize the standard application of identity-based encryption (IBE), namely non-interactive secure communication, as realizing an ideal system which we call delivery controlled channel (DCC). This system allows users to be registered (by a central authority) for an identity and to send messages securely to other users only known by their identity.Quite surprisingly, we show that existing security definitions for IBE are not sufficient to realize DCC. In fact, it is impossible to do so in the standard model. We show, however, how to adjust any IBE scheme that satisfies the standard security definition IND-ID-CPA to achieve this goal in the random oracle model.We also show that the impossibility result can be avoided in the standard model by considering a weaker ideal system that requires all users to be registered in an initial phase before any messages are sent. To achieve this, a weaker security notion, which we introduce and call IND-ID1-CPA, is actually sufficient. This justifies our new security definition and might open the door for more efficient schemes. We further investigate which ideal systems can be realized with schemes satisfying the standard notion and variants of selective security.As a contribution of independent interest, we show how to model features of an ideal system that are potentially available to dishonest parties but not guaranteed, and which such features arise when using IBE. |
7 | ″ | schema:editor | N107680ae38014168b40aee5f176c44cd |
8 | ″ | schema:genre | chapter |
9 | ″ | schema:inLanguage | en |
10 | ″ | schema:isAccessibleForFree | true |
11 | ″ | schema:isPartOf | Nebe7bf31fa86499897bcf224e7c188bd |
12 | ″ | schema:keywords | CPA |
13 | ″ | ″ | DCC |
14 | ″ | ″ | IBE scheme |
15 | ″ | ″ | IND-ID |
16 | ″ | ″ | applications |
17 | ″ | ″ | channels |
18 | ″ | ″ | communication |
19 | ″ | ″ | contribution |
20 | ″ | ″ | definition |
21 | ″ | ″ | delivery |
22 | ″ | ″ | dishonest party |
23 | ″ | ″ | door |
24 | ″ | ″ | efficient scheme |
25 | ″ | ″ | encryption |
26 | ″ | ″ | fact |
27 | ″ | ″ | features |
28 | ″ | ″ | goal |
29 | ″ | ″ | ideal system |
30 | ″ | ″ | identity |
31 | ″ | ″ | identity-based encryption |
32 | ″ | ″ | impossibility results |
33 | ″ | ″ | independent interest |
34 | ″ | ″ | initial phase |
35 | ″ | ″ | interest |
36 | ″ | ″ | messages |
37 | ″ | ″ | model |
38 | ″ | ″ | new security definition |
39 | ″ | ″ | notion |
40 | ″ | ″ | oracle model |
41 | ″ | ″ | parties |
42 | ″ | ″ | phase |
43 | ″ | ″ | random oracle model |
44 | ″ | ″ | results |
45 | ″ | ″ | scheme |
46 | ″ | ″ | secure communication |
47 | ″ | ″ | security |
48 | ″ | ″ | security definitions |
49 | ″ | ″ | security notions |
50 | ″ | ″ | selective security |
51 | ″ | ″ | standard application |
52 | ″ | ″ | standard model |
53 | ″ | ″ | standard notion |
54 | ″ | ″ | such features |
55 | ″ | ″ | system |
56 | ″ | ″ | users |
57 | ″ | ″ | variants |
58 | ″ | ″ | weaker security notion |
59 | ″ | schema:name | Idealizing Identity-Based Encryption |
60 | ″ | schema:pagination | 495-520 |
61 | ″ | schema:productId | N0d3e24ac122346bdb1e62a9a2f440938 |
62 | ″ | ″ | N63314f27d0d647a995c151d3b209020b |
63 | ″ | schema:publisher | Naaacb8c1ef7a4029ab72e3710de72ce8 |
64 | ″ | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1015521850 |
65 | ″ | ″ | https://doi.org/10.1007/978-3-662-48797-6_21 |
66 | ″ | schema:sdDatePublished | 2022-05-10T10:47 |
67 | ″ | schema:sdLicense | https://scigraph.springernature.com/explorer/license/ |
68 | ″ | schema:sdPublisher | N60d41ab2e5234c3cb022bb32b0ffbaad |
69 | ″ | schema:url | https://doi.org/10.1007/978-3-662-48797-6_21 |
70 | ″ | sgo:license | sg:explorer/license/ |
71 | ″ | sgo:sdDataset | chapters |
72 | ″ | rdf:type | schema:Chapter |
73 | N0d3e24ac122346bdb1e62a9a2f440938 | schema:name | dimensions_id |
74 | ″ | schema:value | pub.1015521850 |
75 | ″ | rdf:type | schema:PropertyValue |
76 | N107680ae38014168b40aee5f176c44cd | rdf:first | Ndab1fd968e8e428d883c92dd94637bcf |
77 | ″ | rdf:rest | N837fa0a5ff0440d6894971281e50010b |
78 | N3f23aa5ba85b430e9a58c7781310a046 | rdf:first | sg:person.01316567627.91 |
79 | ″ | rdf:rest | rdf:nil |
80 | N432ddd5e6d324b1bb52e1fbfbc947393 | rdf:first | sg:person.014520474132.60 |
81 | ″ | rdf:rest | N3f23aa5ba85b430e9a58c7781310a046 |
82 | N60d41ab2e5234c3cb022bb32b0ffbaad | schema:name | Springer Nature - SN SciGraph project |
83 | ″ | rdf:type | schema:Organization |
84 | N63314f27d0d647a995c151d3b209020b | schema:name | doi |
85 | ″ | schema:value | 10.1007/978-3-662-48797-6_21 |
86 | ″ | rdf:type | schema:PropertyValue |
87 | N6505a8ff5be247c38c6c6ff4e1d1ec17 | rdf:first | sg:person.012613314054.34 |
88 | ″ | rdf:rest | N432ddd5e6d324b1bb52e1fbfbc947393 |
89 | N837fa0a5ff0440d6894971281e50010b | rdf:first | Nbeeba03136dd4aebb0384a5d400a9018 |
90 | ″ | rdf:rest | rdf:nil |
91 | Naaacb8c1ef7a4029ab72e3710de72ce8 | schema:name | Springer Nature |
92 | ″ | rdf:type | schema:Organisation |
93 | Nbeeba03136dd4aebb0384a5d400a9018 | schema:familyName | Cheon |
94 | ″ | schema:givenName | Jung Hee |
95 | ″ | rdf:type | schema:Person |
96 | Ndab1fd968e8e428d883c92dd94637bcf | schema:familyName | Iwata |
97 | ″ | schema:givenName | Tetsu |
98 | ″ | rdf:type | schema:Person |
99 | Nebe7bf31fa86499897bcf224e7c188bd | schema:isbn | 978-3-662-48796-9 |
100 | ″ | ″ | 978-3-662-48797-6 |
101 | ″ | schema:name | Advances in Cryptology -- ASIACRYPT 2015 |
102 | ″ | rdf:type | schema:Book |
103 | anzsrc-for:08 | schema:inDefinedTermSet | anzsrc-for: |
104 | ″ | schema:name | Information and Computing Sciences |
105 | ″ | rdf:type | schema:DefinedTerm |
106 | anzsrc-for:0804 | schema:inDefinedTermSet | anzsrc-for: |
107 | ″ | schema:name | Data Format |
108 | ″ | rdf:type | schema:DefinedTerm |
109 | sg:person.012613314054.34 | schema:affiliation | grid-institutes:grid.7892.4 |
110 | ″ | schema:familyName | Hofheinz |
111 | ″ | schema:givenName | Dennis |
112 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012613314054.34 |
113 | ″ | rdf:type | schema:Person |
114 | sg:person.01316567627.91 | schema:affiliation | grid-institutes:grid.5801.c |
115 | ″ | schema:familyName | Maurer |
116 | ″ | schema:givenName | Ueli |
117 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01316567627.91 |
118 | ″ | rdf:type | schema:Person |
119 | sg:person.014520474132.60 | schema:affiliation | grid-institutes:grid.5801.c |
120 | ″ | schema:familyName | Matt |
121 | ″ | schema:givenName | Christian |
122 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014520474132.60 |
123 | ″ | rdf:type | schema:Person |
124 | grid-institutes:grid.5801.c | schema:alternateName | Department of Computer Science, ETH Zurich, Zurich, Switzerland |
125 | ″ | schema:name | Department of Computer Science, ETH Zurich, Zurich, Switzerland |
126 | ″ | rdf:type | schema:Organization |
127 | grid-institutes:grid.7892.4 | schema:alternateName | Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany |
128 | ″ | schema:name | Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany |
129 | ″ | rdf:type | schema:Organization |