Extended nested dual system groups, revisited

Junqing Gong, Jie Chen*, Xiaolei Dong, Zhenfu Cao, Shaohua Tang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

33 Scopus citations

Abstract

The notion of extended nested dual system groups (ENDSG) was recently proposed by Hofheinz et al. [PKC 2015] for constructing almost-tight identity based encryptions (IBE) in the multi-instance, multi-ciphertext (MIMC) setting. However only a composite-order instantiation was proposed and more efficient prime-order instantiations are absent. The paper fills the blank by presenting two constructions. We revise the definition of ENDSG and realize it using prime-order bilinear groups based on Chen and Wee’s prime-order instantiation of nested dual system groups [CRYPTO 2013]. This yields the first almosttight IBE in the prime-order setting achieving weak adaptive security in MIMC scenario under the d-linear (d-Lin) assumption. We further enhanced the revised ENDSG to capture stronger security notions for IBE, including B-weak adaptive security and full adaptive security. We show that our prime-order instantiation is readily B-weak adaptive secure and full adaptive secure without introducing extra assumption. We then try to find better solutions by fine-tuning ENDSG again and realizing it using the technique of Chen, Gay, and Wee [EUROCRYPT 2015]. This leads to an almost-tight secure IBE in the same setting with better performance than our first result, but the security relies on a non-standard assumption, d-linear assumption with auxiliary input (d- LinAI) for an even positive integer d. However we note that, the 2-LinAI assumption is implied by the external decisional linear (XDLIN) assumption. This concrete instantiation could also be realized using symmetric bilinear groups under standard decisional linear assumption.

Original languageEnglish
Title of host publicationPublic-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings
EditorsChen-Mou Cheng, Kai-Min Chung, Bo-Yin Yang, Giuseppe Persiano
PublisherSpringer Verlag
Pages133-163
Number of pages31
ISBN (Print)9783662493830
DOIs
StatePublished - 2016
Event19th IACR International Conference on Practice and Theory in Public-Key Cryptography, PKC 2016 - Taipei, Taiwan, Province of China
Duration: 6 Mar 20169 Mar 2016

Publication series

NameLecture Notes in Computer Science
Volume9614
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference19th IACR International Conference on Practice and Theory in Public-Key Cryptography, PKC 2016
Country/TerritoryTaiwan, Province of China
CityTaipei
Period6/03/169/03/16

Keywords

  • Dual system groups
  • Identity based encryptions
  • Prime-order bilinear groups
  • Security model
  • Tight security

Fingerprint

Dive into the research topics of 'Extended nested dual system groups, revisited'. Together they form a unique fingerprint.

Cite this