k-Resilient Identity-Based Encryption in the Standard Model

We present and analyze an adaptive chosen ciphertext secure (IND-CCA) identity-based encryption scheme (IBE) based on the well studied Decisional Diffie-Hellman (DDH) assumption. The scheme is provably secure in the standard model assuming the adversary can corrupt up to a maximum of k users adaptiv...

Full description

Bibliographic Details
Main Author: HENG, S.-H.
Format: Article
Published: 2006
Subjects:
Online Access:http://shdl.mmu.edu.my/2013/
_version_ 1848789939583451136
author HENG, S.-H.
author_facet HENG, S.-H.
author_sort HENG, S.-H.
building MMU Institutional Repository
collection Online Access
description We present and analyze an adaptive chosen ciphertext secure (IND-CCA) identity-based encryption scheme (IBE) based on the well studied Decisional Diffie-Hellman (DDH) assumption. The scheme is provably secure in the standard model assuming the adversary can corrupt up to a maximum of k users adaptively. This is contrary to the Boneh-Franklin scheme which holds in the random-oracle model.
first_indexed 2025-11-14T18:04:41Z
format Article
id mmu-2013
institution Multimedia University
institution_category Local University
last_indexed 2025-11-14T18:04:41Z
publishDate 2006
recordtype eprints
repository_type Digital Repository
spelling mmu-20132011-08-10T07:20:04Z http://shdl.mmu.edu.my/2013/ k-Resilient Identity-Based Encryption in the Standard Model HENG, S.-H. QA75.5-76.95 Electronic computers. Computer science We present and analyze an adaptive chosen ciphertext secure (IND-CCA) identity-based encryption scheme (IBE) based on the well studied Decisional Diffie-Hellman (DDH) assumption. The scheme is provably secure in the standard model assuming the adversary can corrupt up to a maximum of k users adaptively. This is contrary to the Boneh-Franklin scheme which holds in the random-oracle model. 2006-01 Article NonPeerReviewed HENG, S.-H. (2006) k-Resilient Identity-Based Encryption in the Standard Model. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E89-A (1). pp. 39-46. ISSN 0916-8508 http://dx.doi.org/10.1093/ietfec/e89-a.1.39 doi:10.1093/ietfec/e89-a.1.39 doi:10.1093/ietfec/e89-a.1.39
spellingShingle QA75.5-76.95 Electronic computers. Computer science
HENG, S.-H.
k-Resilient Identity-Based Encryption in the Standard Model
title k-Resilient Identity-Based Encryption in the Standard Model
title_full k-Resilient Identity-Based Encryption in the Standard Model
title_fullStr k-Resilient Identity-Based Encryption in the Standard Model
title_full_unstemmed k-Resilient Identity-Based Encryption in the Standard Model
title_short k-Resilient Identity-Based Encryption in the Standard Model
title_sort k-resilient identity-based encryption in the standard model
topic QA75.5-76.95 Electronic computers. Computer science
url http://shdl.mmu.edu.my/2013/
http://shdl.mmu.edu.my/2013/
http://shdl.mmu.edu.my/2013/