WEKO3
アイテム
Relations among Notions of Security for Identity Based Encryption Schemes
https://ipsj.ixsq.nii.ac.jp/records/67735
https://ipsj.ixsq.nii.ac.jp/records/67735303601ab-4d08-47f9-ae23-cb81ac0f084f
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
Copyright (c) 2009 by the Information Processing Society of Japan
|
|
オープンアクセス |
Item type | Journal(1) | |||||||
---|---|---|---|---|---|---|---|---|
公開日 | 2006-08-15 | |||||||
タイトル | ||||||||
タイトル | Relations among Notions of Security for Identity Based Encryption Schemes | |||||||
タイトル | ||||||||
言語 | en | |||||||
タイトル | Relations among Notions of Security for Identity Based Encryption Schemes | |||||||
言語 | ||||||||
言語 | eng | |||||||
キーワード | ||||||||
主題Scheme | Other | |||||||
主題 | 特集:ユビキタス社会を支えるコンピュータセキュリティ技術 | |||||||
資源タイプ | ||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||
資源タイプ | journal article | |||||||
著者所属 | ||||||||
Institute of Industrial Science, The University of Tokyo | ||||||||
著者所属 | ||||||||
Research Center for Information Security, National Institute of Advanced Industrial Science and Technology | ||||||||
著者所属 | ||||||||
Institute of Industrial Science, The University of Tokyo | ||||||||
著者所属 | ||||||||
Institute of Industrial Science, The University of Tokyo | ||||||||
著者所属 | ||||||||
Institute of Industrial Science, The University of Tokyo | ||||||||
著者所属 | ||||||||
Institute of Industrial Science, The University of Tokyo | ||||||||
著者所属 | ||||||||
Institute of Industrial Science, The University of Tokyo | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Institute of Industrial Science, The University of Tokyo | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Research Center for Information Security, National Institute of Advanced Industrial Science and Technology | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Institute of Industrial Science, The University of Tokyo | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Institute of Industrial Science, The University of Tokyo | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Institute of Industrial Science, The University of Tokyo | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Institute of Industrial Science, The University of Tokyo | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Institute of Industrial Science, The University of Tokyo | ||||||||
著者名 |
Peng, Yang
Goichiro, Hanaoka
Yang, Cui
Rui, Zhang
Nuttapong, Attrapadung
Kanta, Matsuura
Hideki, Imai
× Peng, Yang Goichiro, Hanaoka Yang, Cui Rui, Zhang Nuttapong, Attrapadung Kanta, Matsuura Hideki, Imai
|
|||||||
著者名(英) |
Peng, Yang
Goichiro, Hanaoka
Yang, Cui
Rui, Zhang
Nuttapong, Attrapadung
Kanta, Matsuura
Hideki, Imai
× Peng, Yang Goichiro, Hanaoka Yang, Cui Rui, Zhang Nuttapong, Attrapadung Kanta, Matsuura Hideki, Imai
|
|||||||
論文抄録 | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | Identity based encryption (Ιβε) schemes have been flourishing since the very beginning of this century. In Ιβε, proving the security of a scheme in the sense of IND-ID-CCA2 is widely believed to be sufficient to claim that the scheme is also secure in the senses of both SS-ID-CCA2 and NM-ID-CCA2. The justification for this belief is the relations among indistinguishability (IND), semantic security (SS) and non-malleability (NM). However these relations have been proved only for conventional public key encryption (ΡΚε) schemes in previous works. The fact is that Ιβε and ΡΚε have a difference of special importance, i.e., only in Ιβε can the adversaries perform a particular attack, namely, the chosen identity attack. In this paper we have shown that security proved in the sense of IND-ID-CCA2 is validly sufficient for implying security in any other sense in Ιβε. This is to say that the security notion, IND-ID-CCA2, captures the essence of security for all Ιβε schemes. To show this, we first formally defined the notions of security for Ιβε, and then determined the relations among IND, SS and NM in Ιβε, along with rigorous proofs. All of these results take the chosen identity attack into consideration. | |||||||
論文抄録(英) | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | Identity based encryption (Ιβε) schemes have been flourishing since the very beginning of this century. In Ιβε, proving the security of a scheme in the sense of IND-ID-CCA2 is widely believed to be sufficient to claim that the scheme is also secure in the senses of both SS-ID-CCA2 and NM-ID-CCA2. The justification for this belief is the relations among indistinguishability (IND), semantic security (SS) and non-malleability (NM). However these relations have been proved only for conventional public key encryption (ΡΚε) schemes in previous works. The fact is that Ιβε and ΡΚε have a difference of special importance, i.e., only in Ιβε can the adversaries perform a particular attack, namely, the chosen identity attack. In this paper we have shown that security proved in the sense of IND-ID-CCA2 is validly sufficient for implying security in any other sense in Ιβε. This is to say that the security notion, IND-ID-CCA2, captures the essence of security for all Ιβε schemes. To show this, we first formally defined the notions of security for Ιβε, and then determined the relations among IND, SS and NM in Ιβε, along with rigorous proofs. All of these results take the chosen identity attack into consideration. | |||||||
書誌レコードID | ||||||||
収録物識別子タイプ | NCID | |||||||
収録物識別子 | AN00116647 | |||||||
書誌情報 |
情報処理学会論文誌 巻 47, 号 8, p. 2417-2429, 発行日 2006-08-15 |
|||||||
ISSN | ||||||||
収録物識別子タイプ | ISSN | |||||||
収録物識別子 | 1882-7764 |