Abstract
Identity based encryption (IBE) schemes were first constructed with, and often have been since, bilinear mappings (a.k.a. pairings) on elliptic curves. But the multiply and exponent operation using pairings is slowly and inefficiency in implementation. There were, however, some successful attempts to construct IBE schemes based on more traditional number theoretic problems. Unfortunately, most of the proposed schemes are impractical as a result of bandwidth utilization or the time complexity of performance. By this work, we present a new efficient IBE scheme without pairings, which is inspired from the trapdoor technique rooted in composite residuosity class problem. Firstly, our converted basic IBE scheme is proven, in the random oracle model, secure against chosen-plaintext attacks (CPA) under the assumptions that the decision composite residuosity and decision partial discrete logarithm problems are intractable. Moreover, we employ the technique of Fujisaki–Okamoto to transform the basic scheme into enhanced one for resisting chosen-ciphertext attacks (CCA).
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Ateniese G, Gasti P (2009) Universally anonymous ibe based on the quadratic residuosity assumption. In: Cryptographers’ track at the RSA conference, Springer, pp 32–47. https://doi.org/10.1007/978-3-642-00862-7-3
Bellare M, Boldyreva A, Desai A, Pointcheval D (2001) Key-privacy in public-key encryption. In: International conference on the theory and application of cryptology and information security, Springer, pp 566–582. https://doi.org/10.1007/3-540-45682-1-33
Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Annual international cryptology conference, Springer, pp 213–229. https://doi.org/10.1007/3-540-44647-8-13
Boneh D, Katz J (2005) Improved efficiency for cca-secure cryptosystems built using identity-based encryption. In: Cryptographers’ track at the RSA conference, Springer, pp 87–103. https://doi.org/10.1007/2F978-3-540-30574
Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2001) Public key encryption with keyword search. In: EUROCRYPT 2004, p 506. https://doi.org/10.1007/978-3-540-24676-3-30
Boneh D, Gentry C, Hamburg M (2007) Space-efficient identity based encryptionwithout pairings. In: 48th annual IEEE symposium on foundations of computer science, 2007, FOCS’07, IEEE, pp 647–657, https://doi.org/10.1109/FOCS.2007.64
Boneh D, LaVigne R, Sabin M (2013) Identity-based encryption with eth residuosity and its incompressibility. In: Autumn 2013 TRUST conference
Bresson E, Catalano D, Pointcheval D (2003) A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. In: International conference on the theory and application of cryptology and information security, Springer, pp 37–54. https://doi.org/10.1007/978-3-540-40061-5-3
Canetti R, Goldreich O, Halevi S (2004) The random oracle methodology, revisited. J ACM 51(4):557–594. https://doi.org/10.1145/1008731.1008734
Canetti R, Halevi S, Katz J (2007) A forward-secure public-key encryption scheme. J Cryptol 20(3):265–294. https://doi.org/10.1007/s00145-006-0442-5
Chen X, Li J, Weng J, Ma J, Lou W (2016) Verifiable computation over large database with incremental updates. IEEE Trans Comput 65(10):3184–3195. https://doi.org/10.1007/978-3-319-11203-9-9
Clear M, Tewari H, McGoldrick C (2014) Anonymous ibe from quadratic residuosity with improved performance. In: International conference on cryptology in Africa, Springer, pp 377–397. https://doi.org/10.1007/978-3-319-06734-6-23
Cocks C (2001) An identity based encryption scheme based on quadratic residues. In: IMA international conference on cryptography and coding, Springer, pp 360–363. https://doi.org/10.1007/3-540-45325-3-32
Cramer R, Shoup V (2002) Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Advances in cryptology–EUROCRYPT 2002. https://doi.org/10.1007/3-540-46035-7-4
Desmedt Y, Quisquater JJ (1986) Public-key systems based on the difficulty of tampering (is there a difference between des and rsa?). In: Advances in cryptology–CRYPTO’86, Springer, pp 111–117. https://doi.org/10.1007/3-540-47721-7-9
Döttling N, Garg S (2017) Identity-based encryption from the diffie–hellman assumption. In: Annual international cryptology conference, Springer, pp 537–569. https://doi.org/10.1007/978-3-319-63688-7-18
Fujisaki E, Okamoto T (1999) How to enhance the security of public-key encryption at minimum cost. In: International workshop on public key cryptography, Springer, pp 53–68. https://doi.org/10.1007/3-540-49162-7-5
Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the fortieth annual ACM symposium on Theory of computing, ACM, pp 197–206. https://doi.org/10.1145/1374376.1374407
Huang Z, Liu S, Mao X, Chen K, Li J (2017) Insight of the protection for data security under selective opening attacks. Inf Sci 412:223–241. https://doi.org/10.1016/j.ins.2017.05.031
Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437. https://doi.org/10.1109/tc.2013.208
Liu D, Dai Y, Luan T, Yu S et al (2015) Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Trans Emerg Top Comput. https://doi.org/10.1109/TETC.2015.2511457
Meshram C (2015) An efficient id-based cryptographic encryption based on discrete logarithm problem and integer factorization problem. Inf Process Lett 115(2):351–358. https://doi.org/10.1016/j.ipl.2014.10.007
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Advances in cryptology–EUROCRYPT’99, Springer, pp 223–238. https://doi.org/10.1007/3-540-48910-x-16
Pan G, Lei H, Deng Y, Fan L, Yang J, Chen Y, Ding Z (2016) On secrecy performance of miso swipt systems with tas and imperfect csi. IEEE Trans Commun 64(9):3831–3843. https://doi.org/10.1109/eusipco.2016.7760362
Paterson KG, Srinivasan S (2009) On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups. Des Codes Cryptogr 52(2):219–241. https://doi.org/10.1007/s10623-009-9278-y
Rackoff C, Simon D (1992) Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Advances in cryptology–CRYPTO’91, Springer, pp 433–444. https://doi.org/10.1007/3-540-46766-1-35
Shamir A (1985) Identity-based cryptosystems and signature schemes. In: Advances in cryptology, Springer, pp 47–53. https://doi.org/10.1007/3-540-39568-7-5
Shen H, Gao C, He D, Wu L (2015) New biometrics-based authentication scheme for multi-server environment in critical systems. J Ambient Intell Hum Comput 6(6):825–834. https://doi.org/10.1007/s12652-015-0305-8
Tanaka H (1987) A realization scheme for the identity-based cryptosystem. In: Advances in cryptology–CRYPTO’87, Springer, pp 340–349. https://doi.org/10.1007/3-540-48184-2-29
Wang XA, Ma J, Xhafa F, Zhang M, Luo X (2017a) Cost-effective secure e-health cloud system using identity based cryptographic techniques. Future Gener Comput Syst 67:242–254. https://doi.org/10.1016/j.future.2016.08.008
Wang XA, Xhafa F, Ma J, Cao Y, Tang D (2017b) Reusable garbled gates for new fully homomorphic encryption service. Int J Web Grid Serv 13(1):25–48. https://doi.org/10.1504/ijwgs.2017.082061
Waters B (2005) Efficient identity-based encryption without random oracles. In: Advances in cryptology-EUROCRYPT 2005, pp 557–557. https://doi.org/10.1007/11426639-7
Xu J, Wei L, Zhang Y, Wang A, Zhou F, Gao CZ (2018) Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2018.01.014
Acknowledgements
The authors would like to thank the anonymous referees for their fruitful comments that improved the presentation of this paper. This work has been partially supported by the Graduate Innovation Foundation of Guangzhou University Project (Project no. 2017GDJC-D04).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Liu, J., Ke, L. New efficient identity based encryption without pairings. J Ambient Intell Human Comput 10, 1561–1570 (2019). https://doi.org/10.1007/s12652-018-0756-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-018-0756-9