{"id":67735,"updated":"2025-01-22T00:29:25.805380+00:00","links":{},"created":"2025-01-18T23:28:01.130929+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00067735","sets":["581:612:6017"]},"path":["6017"],"owner":"11","recid":"67735","title":["Relations among Notions of Security for Identity Based Encryption Schemes"],"pubdate":{"attribute_name":"公開日","attribute_value":"2006-08-15"},"_buckets":{"deposit":"6bc3227f-a437-41a0-971a-81da36703be7"},"_deposit":{"id":"67735","pid":{"type":"depid","value":"67735","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"Relations among Notions of Security for Identity Based Encryption Schemes","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Relations among Notions of Security for Identity Based Encryption Schemes"},{"subitem_title":"Relations among Notions of Security for Identity Based Encryption Schemes","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"特集:ユビキタス社会を支えるコンピュータセキュリティ技術","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2006-08-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Institute of Industrial Science, The University of Tokyo"},{"subitem_text_value":"Research Center for Information Security, National Institute of Advanced Industrial Science and Technology"},{"subitem_text_value":"Institute of Industrial Science, The University of Tokyo"},{"subitem_text_value":"Institute of Industrial Science, The University of Tokyo"},{"subitem_text_value":"Institute of Industrial Science, The University of Tokyo"},{"subitem_text_value":"Institute of Industrial Science, The University of Tokyo"},{"subitem_text_value":"Institute of Industrial Science, The University of Tokyo"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Institute of Industrial Science, The University of Tokyo","subitem_text_language":"en"},{"subitem_text_value":"Research Center for Information Security, National Institute of Advanced Industrial Science and Technology","subitem_text_language":"en"},{"subitem_text_value":"Institute of Industrial Science, The University of Tokyo","subitem_text_language":"en"},{"subitem_text_value":"Institute of Industrial Science, The University of Tokyo","subitem_text_language":"en"},{"subitem_text_value":"Institute of Industrial Science, The University of Tokyo","subitem_text_language":"en"},{"subitem_text_value":"Institute of Industrial Science, The University of Tokyo","subitem_text_language":"en"},{"subitem_text_value":"Institute of Industrial Science, The University of Tokyo","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/67735/files/IPSJ-JNL4708009.pdf"},"date":[{"dateType":"Available","dateValue":"2008-08-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL4708009.pdf","filesize":[{"value":"270.6 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"4e65f16c-f8af-48a7-8dbb-6c4b0dc4bba3","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2009 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Peng, Yang"},{"creatorName":"Goichiro, Hanaoka"},{"creatorName":"Yang, Cui"},{"creatorName":"Rui, Zhang"},{"creatorName":"Nuttapong, Attrapadung"},{"creatorName":"Kanta, Matsuura"},{"creatorName":"Hideki, Imai"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Peng, Yang","creatorNameLang":"en"},{"creatorName":"Goichiro, Hanaoka","creatorNameLang":"en"},{"creatorName":"Yang, Cui","creatorNameLang":"en"},{"creatorName":"Rui, Zhang","creatorNameLang":"en"},{"creatorName":"Nuttapong, Attrapadung","creatorNameLang":"en"},{"creatorName":"Kanta, Matsuura","creatorNameLang":"en"},{"creatorName":"Hideki, Imai","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Identity based encryption (Ιβε) schemes have been flourishing since the very beginning of this century. In Ιβε, proving the security of a scheme in the sense of IND-ID-CCA2 is widely believed to be sufficient to claim that the scheme is also secure in the senses of both SS-ID-CCA2 and NM-ID-CCA2. The justification for this belief is the relations among indistinguishability (IND), semantic security (SS) and non-malleability (NM). However these relations have been proved only for conventional public key encryption (ΡΚε) schemes in previous works. The fact is that Ιβε and ΡΚε have a difference of special importance, i.e., only in Ιβε can the adversaries perform a particular attack, namely, the chosen identity attack. In this paper we have shown that security proved in the sense of IND-ID-CCA2 is validly sufficient for implying security in any other sense in Ιβε. This is to say that the security notion, IND-ID-CCA2, captures the essence of security for all Ιβε schemes. To show this, we first formally defined the notions of security for Ιβε, and then determined the relations among IND, SS and NM in Ιβε, along with rigorous proofs. All of these results take the chosen identity attack into consideration.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Identity based encryption (Ιβε) schemes have been flourishing since the very beginning of this century. In Ιβε, proving the security of a scheme in the sense of IND-ID-CCA2 is widely believed to be sufficient to claim that the scheme is also secure in the senses of both SS-ID-CCA2 and NM-ID-CCA2. The justification for this belief is the relations among indistinguishability (IND), semantic security (SS) and non-malleability (NM). However these relations have been proved only for conventional public key encryption (ΡΚε) schemes in previous works. The fact is that Ιβε and ΡΚε have a difference of special importance, i.e., only in Ιβε can the adversaries perform a particular attack, namely, the chosen identity attack. In this paper we have shown that security proved in the sense of IND-ID-CCA2 is validly sufficient for implying security in any other sense in Ιβε. This is to say that the security notion, IND-ID-CCA2, captures the essence of security for all Ιβε schemes. To show this, we first formally defined the notions of security for Ιβε, and then determined the relations among IND, SS and NM in Ιβε, along with rigorous proofs. All of these results take the chosen identity attack into consideration.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"2429","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"2417","bibliographicIssueDates":{"bibliographicIssueDate":"2006-08-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"8","bibliographicVolumeNumber":"47"}]},"relation_version_is_last":true,"weko_creator_id":"11"}}