TY - GEN
T1 - Identity-based extractable hash proofs and their applications
AU - Chen, Yu
AU - Zhang, Zongyang
AU - Lin, Dongdai
AU - Cao, Zhenfu
PY - 2012
Y1 - 2012
N2 - In this paper, we introduce a general paradigm called identity-based extractable hash proof system (IB-EHPS), which is an extension of extractable hash proof system (EHPS) proposed by Wee (CRYPTO '10). We show how to construct identity-based encryption (IBE) scheme from IB-EHPS in a simple and modular fashion. Our construction provides a generic method of building and interpreting CCA-secure IBE schemes based on computational assumptions. As instantiations, we realize IB-EHPS from the bilinear Diffie-Hellman assumption and the modified bilinear Diffie-Hellman assumption, respectively.
AB - In this paper, we introduce a general paradigm called identity-based extractable hash proof system (IB-EHPS), which is an extension of extractable hash proof system (EHPS) proposed by Wee (CRYPTO '10). We show how to construct identity-based encryption (IBE) scheme from IB-EHPS in a simple and modular fashion. Our construction provides a generic method of building and interpreting CCA-secure IBE schemes based on computational assumptions. As instantiations, we realize IB-EHPS from the bilinear Diffie-Hellman assumption and the modified bilinear Diffie-Hellman assumption, respectively.
UR - https://www.scopus.com/pages/publications/84863448521
U2 - 10.1007/978-3-642-31284-7_10
DO - 10.1007/978-3-642-31284-7_10
M3 - 会议稿件
AN - SCOPUS:84863448521
SN - 9783642312830
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 153
EP - 170
BT - Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Proceedings
T2 - 10th International Conference on Applied Cryptography and Network Security, ACNS 2012
Y2 - 26 June 2012 through 29 June 2012
ER -