In this paper, we present an efficient variant of the Boneh-Franklin scheme that achieves a tight security reduction. Our scheme is basically an IBE scheme under two keys, one of which is randomly chosen and given to the user. It can be viewed as a continuation of an idea introduced by Katz and Wang; however, unlike the Katz-Wang variant, our scheme is quite efficient, as its ciphertext size is roughly comparable to that of the original full Boneh-Franklin scheme. The security of our scheme can be based on either the gap bilinear Diffie-Hellman (GBDH) or the decisional bilinear Diffie-Hellman (DBDH) assumptions.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Nuttapong ATTRAPADUNG, Jun FURUKAWA, Takeshi GOMI, Goichiro HANAOKA, Hideki IMAI, Rui ZHANG, "Efficient Identity-Based Encryption with Tight Security Reduction" in IEICE TRANSACTIONS on Fundamentals,
vol. E90-A, no. 9, pp. 1803-1813, September 2007, doi: 10.1093/ietfec/e90-a.9.1803.
Abstract: In this paper, we present an efficient variant of the Boneh-Franklin scheme that achieves a tight security reduction. Our scheme is basically an IBE scheme under two keys, one of which is randomly chosen and given to the user. It can be viewed as a continuation of an idea introduced by Katz and Wang; however, unlike the Katz-Wang variant, our scheme is quite efficient, as its ciphertext size is roughly comparable to that of the original full Boneh-Franklin scheme. The security of our scheme can be based on either the gap bilinear Diffie-Hellman (GBDH) or the decisional bilinear Diffie-Hellman (DBDH) assumptions.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1093/ietfec/e90-a.9.1803/_p
Copy
@ARTICLE{e90-a_9_1803,
author={Nuttapong ATTRAPADUNG, Jun FURUKAWA, Takeshi GOMI, Goichiro HANAOKA, Hideki IMAI, Rui ZHANG, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Efficient Identity-Based Encryption with Tight Security Reduction},
year={2007},
volume={E90-A},
number={9},
pages={1803-1813},
abstract={In this paper, we present an efficient variant of the Boneh-Franklin scheme that achieves a tight security reduction. Our scheme is basically an IBE scheme under two keys, one of which is randomly chosen and given to the user. It can be viewed as a continuation of an idea introduced by Katz and Wang; however, unlike the Katz-Wang variant, our scheme is quite efficient, as its ciphertext size is roughly comparable to that of the original full Boneh-Franklin scheme. The security of our scheme can be based on either the gap bilinear Diffie-Hellman (GBDH) or the decisional bilinear Diffie-Hellman (DBDH) assumptions.},
keywords={},
doi={10.1093/ietfec/e90-a.9.1803},
ISSN={1745-1337},
month={September},}
Copy
TY - JOUR
TI - Efficient Identity-Based Encryption with Tight Security Reduction
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1803
EP - 1813
AU - Nuttapong ATTRAPADUNG
AU - Jun FURUKAWA
AU - Takeshi GOMI
AU - Goichiro HANAOKA
AU - Hideki IMAI
AU - Rui ZHANG
PY - 2007
DO - 10.1093/ietfec/e90-a.9.1803
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E90-A
IS - 9
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - September 2007
AB - In this paper, we present an efficient variant of the Boneh-Franklin scheme that achieves a tight security reduction. Our scheme is basically an IBE scheme under two keys, one of which is randomly chosen and given to the user. It can be viewed as a continuation of an idea introduced by Katz and Wang; however, unlike the Katz-Wang variant, our scheme is quite efficient, as its ciphertext size is roughly comparable to that of the original full Boneh-Franklin scheme. The security of our scheme can be based on either the gap bilinear Diffie-Hellman (GBDH) or the decisional bilinear Diffie-Hellman (DBDH) assumptions.
ER -