Skip to main content
Log in

Direct constructions and proofs for CCA secure (LR)IBE with dual system encryption

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Boneh D, Boyen X. Efficient selective-ID secure identity-based encryption without random oracles. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2004. 223–238

    Google Scholar 

  2. Lewko A, Waters B. New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Proceedings of the 7th International Conference on Theory of Cryptography, Zurich, 2010. 455–479

    Google Scholar 

  3. Naor M, Segev G. Public-key cryptosystems resilient to key leakage. In: Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, 2009. 18–35

    Google Scholar 

  4. Cramer R, Shoup V. Universal hash proofs and a paradigm for adaptive chosen ciphertext secure publickey encryption. In: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology. Berlin: Springer, 2002. 45–64

    Google Scholar 

  5. Chow S, Dodis Y, Rouselakis Y, et al. Practical leakage-resilient identity-based encryption from simple assumptions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, 2010. 152–161

    Google Scholar 

  6. Lewko A, Rouselakis Y, Waters B. Achieving leakage resilience through dual system encryption. In: Proceedings of the 8th Conference on Theory of Cryptography, Providence, 2011. 70–88

    Chapter  Google Scholar 

  7. Li J, Guo Y, Yu Q, et al. Provably secure identitybased encryption resilient to post-challenge continuous auxiliary inputs leakage. Secur Commun Netw, 2016, 9: 1016–1024

    Article  Google Scholar 

  8. Kiltz E, Vahlis Y. CCA2 secure IBE: standard model efficiency through authenticated symmetric encryption. In: Proceedings of the Cryptopgraphers’ Track at the RSA Conference on Topics in Cryptology, San Francisco, 2008. 221–238

    Google Scholar 

  9. Alwen J, Dodis Y, Naor M, et al. Public-Key encryption in the bounded-retrieval model. In: Proceedings of the 29th Annual International Conference on Theory and Applications of Cryptographic Techniques, French Riviera, 2010. 113–134

    Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. 61572303, 61772326), National Key Research and Development Program of China (Grant Nos. 2017YFB0802003, 2017YFB0802004), National Cryptography Development Fund during the 13th Five-Year Plan Period (Grant No. MMJJ20170216), Foundation of State Key Laboratory of Information Security (Grant No. 2017-MS-03), and Fundamental Research Funds for the Central Universities (Grant No. GK201702004).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bo Yang.

Additional information

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhao, Y., Yang, B. Direct constructions and proofs for CCA secure (LR)IBE with dual system encryption. Sci. China Inf. Sci. 60, 119104 (2017). https://doi.org/10.1007/s11432-016-9204-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-016-9204-6

Navigation