Hierarchical ID-Based Cryptography
نویسندگان
چکیده
We present hierarchical identity-based encryption schemes and signature schemes that have total collusion resistance on an arbitrary number of levels and that have chosen ciphertext security in the random oracle model assuming the difficulty of the Bilinear Diffie-Hellman problem.
منابع مشابه
Generalized Hierarchical Identity-Based Signcryption
In this paper, we propose a generic method to construct Hierarchical Identity-Based Signcryption scheme. Using this method, a Hierarchical Identity-Based Signcryption scheme can be converted from any Hierarchical Identity-Based Encryption scheme. Then, we give a concrete instantiation, which is the first constant-size fully secure hierarchical identity-based signcryption scheme in the standard ...
متن کاملHierarchical Identity-Based Lossy Trapdoor Functions
Lossy trapdoor functions, introduced by Peikert and Waters (STOC’08), have received a lot of attention in the last years, because of their wide range of applications in theoretical cryptography. The notion has been recently extended to the identity-based scenario by Bellare et al. (Eurocrypt’12). We provide one more step in this direction, by considering the notion of hierarchical identity-base...
متن کاملAnonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
Efficient and privacy-preserving constructions for search functionality on encrypted data is important issues for data outsourcing, and data retrieval, etc. Fully secure anonymous Hierarchical ID-Based Encryption (HIBE) schemes is useful primitives that can be applicable to searchable encryptions [4], such as ID-based searchable encryption, temporary searchable encryption [1], and anonymous for...
متن کاملSignatures in hierarchical certificateless cryptography: Efficient constructions and provable security
Recent years, lots of efforts have been devoted to construct secure schemes in certificateless cryptography which eliminates the key escrow problem in identity-based cryptography. However, most of them are designed in traditional certificateless cryptography which suffers from the single-point problem. Hierarchical cryptography exploits a practical security model to mirror the organizational hi...
متن کاملSurvey on Identity based and Hierarchical Identity based Encryption Schemes
In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptography (IBC) and their security implications with applications. First, we introduce the basic concepts of security and principles of cryptography and then move into identity-based cryptography, an overview of its development process and research progress. We explain identity-based encryption (IBE)...
متن کامل