Identity-based extractable hash proofs and their applications

  • Yu Chen
  • , Zongyang Zhang
  • , Dongdai Lin
  • , Zhenfu Cao*
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

In this paper, we introduce a general paradigm called identity-based extractable hash proof system (IB-EHPS), which is an extension of extractable hash proof system (EHPS) proposed by Wee (CRYPTO '10). We show how to construct identity-based encryption (IBE) scheme from IB-EHPS in a simple and modular fashion. Our construction provides a generic method of building and interpreting CCA-secure IBE schemes based on computational assumptions. As instantiations, we realize IB-EHPS from the bilinear Diffie-Hellman assumption and the modified bilinear Diffie-Hellman assumption, respectively.

Original languageEnglish
Title of host publicationApplied Cryptography and Network Security - 10th International Conference, ACNS 2012, Proceedings
Pages153-170
Number of pages18
DOIs
StatePublished - 2012
Externally publishedYes
Event10th International Conference on Applied Cryptography and Network Security, ACNS 2012 - Singapore, Singapore
Duration: 26 Jun 201229 Jun 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7341 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th International Conference on Applied Cryptography and Network Security, ACNS 2012
Country/TerritorySingapore
CitySingapore
Period26/06/1229/06/12

Fingerprint

Dive into the research topics of 'Identity-based extractable hash proofs and their applications'. Together they form a unique fingerprint.

Cite this