Abstract
In this paper, we introduce a general paradigm called identity-based extractable hash proof system (IB-EHPS), which is an extension of extractable hash proof system (EHPS) proposed by Wee (CRYPTO'10). We show how to construct identity-based key encapsulation mechanism (IB-KEM) from IB-EHPS in a simple and modular fashion. Our construction provides a generic method of building and interpreting CCA-secure IB-KEMs based on computational assumptions. As instantiations, we realize IB-EHPS from the bilinear Diffie-Hellman assumption and the modified bilinear Diffie-Hellman assumption, respectively. Besides, we carefully investigate the relation between EHPS and IB-EHPS, and indicate possible refinement and generalization of EHPS.
| Original language | English |
|---|---|
| Pages (from-to) | 1537-1556 |
| Number of pages | 20 |
| Journal | Computer Journal |
| Volume | 57 |
| Issue number | 10 |
| DOIs | |
| State | Published - 6 Sep 2014 |
| Externally published | Yes |
Keywords
- BDH assumption
- CCA security
- identity-based extractable hash proof system
- identity-based key encapsulation mechanism