Skip to main content

2018 | OriginalPaper | Buchkapitel

Single Private-Key Generator Security Implies Multiple Private-Key Generators Security

verfasst von : Atsushi Fujioka, Kazuki Yoneyama

Erschienen in: Provable Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper discusses the security of identity-based cryptography with multiple private-key generators (mPKG-IBC). Most mPKG-IBC schemes and protocols are statically secure where private-key generators (PKGs) cannot control a binding between a party and its PKG. We propose adaptive security notions for identity-based key encapsulation mechanism with multiple private-key generators, identity-based signature with multiple private-key generators, and identity-based authenticated key exchange with multiple private-key generators, respectively. In additions, we provide their generic constructions of those from identity-based key encapsulation mechanism, identity-based signature, and identity-based authenticated key exchange which are secure in a single PKG model, respectively.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586–615 (2003)MathSciNetCrossRef Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586–615 (2003)MathSciNetCrossRef
2.
Zurück zum Zitat Chen, L., Kudla, C.: Identity based authenticated key agreement protocols from pairings. In: 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), pp. 219–233. IEEE Computer Society (2003). http://eprint.iacr.org/2002/184 Chen, L., Kudla, C.: Identity based authenticated key agreement protocols from pairings. In: 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), pp. 219–233. IEEE Computer Society (2003). http://​eprint.​iacr.​org/​2002/​184
6.
Zurück zum Zitat Fujioka, A., Suzuki, K., Xagawa, K., Yoneyama, K.: Strongly secure authenticated key exchange from factoring, codes, and lattices. Des. Codes Cryptogr. 76(3), 469–504 (2015). A preliminary version is appeared in PKC 2012 (2012)MathSciNetCrossRef Fujioka, A., Suzuki, K., Xagawa, K., Yoneyama, K.: Strongly secure authenticated key exchange from factoring, codes, and lattices. Des. Codes Cryptogr. 76(3), 469–504 (2015). A preliminary version is appeared in PKC 2012 (2012)MathSciNetCrossRef
7.
Zurück zum Zitat Huang, H., Cao, Z.: An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem. In: Li, W., Susilo, W., Tupakula, U.K., Safavi-Naini, R., Varadharajan, V. (eds.) ASIACCS 2009, pp. 333–342. ACM, New York (2009) Huang, H., Cao, Z.: An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem. In: Li, W., Susilo, W., Tupakula, U.K., Safavi-Naini, R., Varadharajan, V. (eds.) ASIACCS 2009, pp. 333–342. ACM, New York (2009)
8.
Zurück zum Zitat Karthikeyan, H., Chakraborty, S., Singh, K., Rangan, C.P.: An efficient multiple PKG compatible identity based key agreement for vehicular networks. IACR Cryptology ePrint Archive 2015, 1012 (2015). A preliminary version was presented as “An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks” in Inscrypt 2015 Karthikeyan, H., Chakraborty, S., Singh, K., Rangan, C.P.: An efficient multiple PKG compatible identity based key agreement for vehicular networks. IACR Cryptology ePrint Archive 2015, 1012 (2015). A preliminary version was presented as “An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks” in Inscrypt 2015
10.
Zurück zum Zitat Qin, L., Cao, Z., Dong, X.: Multi-receiver identity-based encryption in multiple PKG environment. In: Proceedings of the Global Communications Conference, GLOBECOM 2008, pp. 1862–1866. IEEE (2008) Qin, L., Cao, Z., Dong, X.: Multi-receiver identity-based encryption in multiple PKG environment. In: Proceedings of the Global Communications Conference, GLOBECOM 2008, pp. 1862–1866. IEEE (2008)
12.
Zurück zum Zitat Wang, S., Cao, Z., Xie, Q., Liu, W.: Practical identity-based encryption in multiple private key generator (PKG) environments. Secur. Commun. Netw. 8(1), 43–50 (2015)CrossRef Wang, S., Cao, Z., Xie, Q., Liu, W.: Practical identity-based encryption in multiple private key generator (PKG) environments. Secur. Commun. Netw. 8(1), 43–50 (2015)CrossRef
13.
Zurück zum Zitat Xu, Z., Ma, R., Liu, S., He, W.: EISM: an efficient ID-based signcryption scheme for multi-PKG multihop wireless networks of mobile hosts. Ad Hoc Sens. Wirel. Netw. 11(1–2), 93–110 (2011) Xu, Z., Ma, R., Liu, S., He, W.: EISM: an efficient ID-based signcryption scheme for multi-PKG multihop wireless networks of mobile hosts. Ad Hoc Sens. Wirel. Netw. 11(1–2), 93–110 (2011)
Metadaten
Titel
Single Private-Key Generator Security Implies Multiple Private-Key Generators Security
verfasst von
Atsushi Fujioka
Kazuki Yoneyama
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-01446-9_4