Construction of a hybrid HIBE protocol secure against adaptive attacks (without random Oracle)

ISSN: 03029743
8Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.

Abstract

We describe a hybrid hierarchical identity based encryption (HIBE) protocol which is secure in the full model without using the random oracle heuristic and whose security is based on the computational hardness of the decisional bilinear Diffie-Hellman (DBDH) problem. The new protocol is obtained by augmenting a previous construction of a HIBE protocol which is secure against chosen plaintext attacks (CPA-secure). The technique for answering decryption queries in the proof is based on earlier work by Boyen-Mei-Waters. Ciphertext validity testing is done indirectly through a symmetric authentication algorithm in a manner similar to the Kurosawa-Desmedt public key encryption protocol. Additionally, we perform symmetric encryption and authentication by a single authenticated encryption algorithm. A net result of all these is that our construction improves upon previously known constructions in the same setting. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Sarkar, P., & Chatterjee, S. (2007). Construction of a hybrid HIBE protocol secure against adaptive attacks (without random Oracle). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4784 LNCS, pp. 51–67).

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free