loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: S. Sree Vivek 1 ; S. Sharmila Deva Selvi 2 ; Aanchal Malhotra 3 and C. Pandu Rangan 4

Affiliations: 1 Samsung R&D Institute, India ; 2 Microsoft Research India, India ; 3 Boston University, United States ; 4 IIT Madras, India

ISBN: 978-989-758-117-5

Keyword(s): Identity based Cryptography, Encryption without Bilinear Pairing, Without Full Domain Hash, Provable Security, Random Oracle Model.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data Engineering ; Databases and Data Security ; Information and Systems Security

Abstract: Since the discovery of identity based cryptography, a number of identity based encryption schemes were reported in the literature. Although a few schemes were proposed after its introduction, the first efficient identity based encryption scheme was proposed by Dan Boneh and Matthew K. Franklin in 2001. This encryption scheme uses Weil pairing on elliptic curves during both encryption and decryption process. In this paper, we propose a new identity based encryption scheme and prove its security in the random oracle model. There are two highlighting features in our scheme. First, it does not employ bilinear pairing computation during the encryption process. Second, our scheme does not require full domain hashing, which makes our scheme more practical and efficiently implementable. Moreover, we prove the security of our scheme by reducing it to the well known Computational Bilinear Diffie-Hellman problem. We first prove the security of our scheme in weaker security notion i.e. we prove o ur scheme to be IND-CPA secure. Then using Fujisaki Okamoto transformation, we convert our scheme to IND-CCA secure version. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.209.80.87

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Sree Vivek, S.; Sharmila Deva Selvi, S.; Malhotra, A. and Pandu Rangan, C. (2015). Practical IBE Secure under CBDH - Encrypting Without Pairing.In Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015) ISBN 978-989-758-117-5, pages 251-258. DOI: 10.5220/0005541802510258

@conference{secrypt15,
author={S. Sree Vivek. and S. Sharmila Deva Selvi. and Aanchal Malhotra. and C. Pandu Rangan.},
title={Practical IBE Secure under CBDH - Encrypting Without Pairing},
booktitle={Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)},
year={2015},
pages={251-258},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005541802510258},
isbn={978-989-758-117-5},
}

TY - CONF

JO - Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)
TI - Practical IBE Secure under CBDH - Encrypting Without Pairing
SN - 978-989-758-117-5
AU - Sree Vivek, S.
AU - Sharmila Deva Selvi, S.
AU - Malhotra, A.
AU - Pandu Rangan, C.
PY - 2015
SP - 251
EP - 258
DO - 10.5220/0005541802510258

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.