This paper presents a first example of secure identity based encryption scheme (IBE) without redundancy in the sense of Phan and Pointcheval. This modification of the Boneh-Franklin IBE is an hybrid construction that is proved to be secure (using proof techniques borrowed from those for KEM-DEM constructions) in the random oracle model under a slightly stronger assumption than the original IBE and turns out to be more efficient at decryption than the latter. A second contribution of this work is to show how to shorten ciphertexts in a recently proposed multiple-recipient IBE scheme. Our modification of the latter scheme spares about 1180 bits from a bandwidth point of view as, some-what surprisingly, redundancies are not needed although all elements of the ciphertext space are not reachable by the encryption mapping. This shows that in public key encryption schemes, redundancies may be useless even when the encryption mapping is not a surjection. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Libert, B., & Quisquater, J. J. (2005). Identity based encryption without redundancy. In Lecture Notes in Computer Science (Vol. 3531, pp. 285–300). Springer Verlag. https://doi.org/10.1007/11496137_20
Mendeley helps you to discover research relevant for your work.