Shorter IBE and Signatures via Asymmetric Pairings

نویسندگان

  • Jie Chen
  • Hoon Wei Lim
  • San Ling
  • Huaxiong Wang
  • Hoeteck Wee
چکیده

We present efficient Identity-Based Encryption (IBE) and signature schemes under the Symmetric External Diffie-Hellman (SXDH) assumption in bilinear groups; our IBE scheme also achieves anonymity. In both the IBE and the signature schemes, all parameters have constant numbers of group elements, and are shorter than those of previous constructions based on Decisional Linear (DLIN) assumption. Our constructions use both dual system encryption (Waters, Crypto ’09) and dual pairing vector spaces (Okamoto and Takashima, Pairing ’08, Asiacrypt ’09). Specifically, we show how to adapt the recent DLIN-based instantiations of Lewko (Eurocrypt ’12) to the SXDH assumption. To our knowledge, this is the first work to instantiate either dual system encryption or dual pairing vector spaces under the SXDH assumption. Furthermore, our work could be extended to many other Functional Encryption. Particularly, we show how to instantiate our framework to Inner Product Encryption (IPE) and Key-Policy Functional Encryption (KP-FE). All parameters of our constructions are shorter than those of DLIN-based constructions. ⋆ Research of the authors is supported in part by the National Research Foundation of Singapore under Research Grant NRF-CRP2-2007-03. Hoeteck Wee’s work is also supported by NSF CAREER Award CNS-1237429.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Variants of Waters’ Dual-System Primitives Using Asymmetric Pairings

Waters, in 2009, introduced an important technique, called dual-system encryption, to construct identity-based encryption (IBE) and related schemes. The resulting IBE scheme was described in the setting of symmetric pairing. A key feature of the construction is the presence of random tags in the ciphertext and decryption key. Later work by Lewko and Waters has removed the tags and proceeding th...

متن کامل

Shorter identity-based encryption via asymmetric pairings

We present efficient Identity-Based Encryption (IBE) under the Symmetric External DiffieHellman (SXDH) assumption in bilinear groups. In our IBE scheme, all parameters have constant numbers of group elements, and are shorter than those of previous constructions based on Decisional Linear (DLIN) assumption. Our construction uses both dual system encryption (Waters, Crypto ’09) and dual pairing v...

متن کامل

Variants of Waters' Dual System Primitives Using Asymmetric Pairings - (Extended Abstract)

Waters, in 2009, introduced an important technique, called dual system encryption, to construct identity-based encryption (IBE) and related schemes. The resulting IBE scheme was described in the setting of symmetric pairing. A key feature of the construction is the presence of random tags in the ciphertext and decryption key. Later work by Lewko and Waters removed the tags and proceeding throug...

متن کامل

Anonymous Constant-Size Ciphertext HIBE from Asymmetric Pairings

We present a new hierarchical identity based encryption (HIBE) scheme with constant-size ciphertext that can be implemented using the most efficient bilinear pairings, namely, Type-3 pairings. In addition to being fully secure, our scheme is anonymous. The HIBE is obtained by extending an asymmetric pairing based IBE scheme due to Lewko and Waters. The extension uses the approach of Boneh-Boyen...

متن کامل

Short Structure-Preserving Signatures

We construct a new structure-preserving signature scheme in the efficient Type-III asymmetric bilinear group setting with signatures shorter than all existing schemes. Our signatures consist of 3 group elements from the first source group and therefore have shorter size than all existing schemes as existing ones have at least one component of the signature in the second source group whose eleme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2012  شماره 

صفحات  -

تاریخ انتشار 2012