Identification Schemes from Key Encapsulation Mechanisms

نویسندگان

  • Hiroaki Anada
  • Seiko Arita
چکیده

We propose a generic way for deriving an identification (ID) scheme secure against concurrent man-in-the-middle attacks from a key encapsulation mechanism (KEM) secure against chosen ciphertext attacks on one-wayness (one-way-CCA). Then we give a concrete one-way-CCA secure KEM based on the Computational Diffie-Hellman (CDH) assumption. In that construction, the Twin Diffie-Hellman technique of Cash-Kiltz-Shoup is essentially employed. We compare efficiency of the ID scheme derived from our KEM with previously known ID schemes and KEMs. It turns out that our KEM-based ID scheme is faster in one exponentiation than the currently most efficient one derived from the HanaokaKurosawa KEM, whose security is based on the same CDH assumption.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Certificateless Signcryption Tag-KEMs for Resource-constrained Devices

Efficient certificateless one-pass session key establishment protocols can be constructed from key encapsulation mechanisms (KEMs) by making use of tags and signcryption schemes. The resulting primitives are referred to as Certificateless Signcryption Tag Key Encapsulation Mechanisms (CLSC-TKEMs). In this paper we propose two novel CLSC-TKEM protocols, the first, named LSW-CLSC-TKEM, makes use ...

متن کامل

Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms

Attribute-Based Encryption (ABE) allows to target the recipients of a message according to a policy expressed as a predicate among some attributes. Ciphertext-policy ABE schemes can choose the policy at the encryption time. In this paper, we define a new property for ABE: homomorphic-policy. A combiner is able to (publicly) combine ciphertexts under different policies into a ciphertext under a ...

متن کامل

Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement

We discuss the relationship between ID-based key agreement protocols, certificateless encryption and ID-based key encapsulation mechanisms. In particular we show how in some sense ID-based key agreement is a primitive from which all others can be derived. In doing so we focus on distinctions between what we term pure ID-based schemes and non-pure schemes, in various security models. We present ...

متن کامل

Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM

(1, 2, 3, 4, 5. College of Information Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, P.R.China) * corresponding author 1. E-mail: [email protected] 2. E-mail: [email protected] 3. E-mail: [email protected] 4. E-mail: [email protected] 5. E-mail: [email protected] Abstract. We use hybrid encryption with Fuzzy Identity-Based Encryption (F...

متن کامل

Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles

We present a new technique to realize attribute-based encryption (ABE) schemes secure in the standard model against chosen-ciphertext attacks (CCA-secure). Our approach is to extend certain concrete chosen-plaintext secure (CPA-secure) ABE schemes to achieve more efficient constructions than the known generic constructions of CCA-secure ABE schemes. We restrict ourselves to the construction of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEICE Transactions

دوره 95-A  شماره 

صفحات  -

تاریخ انتشار 2011