References
Boneh D, Boyen X. Efficient selective-ID secure identity-based encryption without random oracles. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2004. 223–238
Lewko A, Waters B. New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Proceedings of the 7th International Conference on Theory of Cryptography, Zurich, 2010. 455–479
Naor M, Segev G. Public-key cryptosystems resilient to key leakage. In: Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, 2009. 18–35
Cramer R, Shoup V. Universal hash proofs and a paradigm for adaptive chosen ciphertext secure publickey encryption. In: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology. Berlin: Springer, 2002. 45–64
Chow S, Dodis Y, Rouselakis Y, et al. Practical leakage-resilient identity-based encryption from simple assumptions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, 2010. 152–161
Lewko A, Rouselakis Y, Waters B. Achieving leakage resilience through dual system encryption. In: Proceedings of the 8th Conference on Theory of Cryptography, Providence, 2011. 70–88
Li J, Guo Y, Yu Q, et al. Provably secure identitybased encryption resilient to post-challenge continuous auxiliary inputs leakage. Secur Commun Netw, 2016, 9: 1016–1024
Kiltz E, Vahlis Y. CCA2 secure IBE: standard model efficiency through authenticated symmetric encryption. In: Proceedings of the Cryptopgraphers’ Track at the RSA Conference on Topics in Cryptology, San Francisco, 2008. 221–238
Alwen J, Dodis Y, Naor M, et al. Public-Key encryption in the bounded-retrieval model. In: Proceedings of the 29th Annual International Conference on Theory and Applications of Cryptographic Techniques, French Riviera, 2010. 113–134
Acknowledgements
This work was supported by National Natural Science Foundation of China (Grant Nos. 61572303, 61772326), National Key Research and Development Program of China (Grant Nos. 2017YFB0802003, 2017YFB0802004), National Cryptography Development Fund during the 13th Five-Year Plan Period (Grant No. MMJJ20170216), Foundation of State Key Laboratory of Information Security (Grant No. 2017-MS-03), and Fundamental Research Funds for the Central Universities (Grant No. GK201702004).
Author information
Authors and Affiliations
Corresponding author
Additional information
The authors declare that they have no conflict of interest.
Rights and permissions
About this article
Cite this article
Zhao, Y., Yang, B. Direct constructions and proofs for CCA secure (LR)IBE with dual system encryption. Sci. China Inf. Sci. 60, 119104 (2017). https://doi.org/10.1007/s11432-016-9204-6
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-016-9204-6