Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions

@article{Waters2009DualSE,
  title={Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions},
  author={Brent Waters},
  journal={IACR Cryptology ePrint Archive},
  year={2009},
  volume={2009},
  pages={385}
}
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption (IBE) and Hierarchical Identity-Based Encryption (HIBE) systems under the simple and established decisional Bilinear Diffie-Hellman and decisional Linear assumptions. Our IBE system has ciphertexts, private keys, and public parameters each consisting of a constant number of group elements. These results are the first… CONTINUE READING
Highly Influential
This paper has highly influenced 98 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 801 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 390 extracted citations

FAME: Fast Attribute-based Message Encryption

ACM Conference on Computer and Communications Security • 2017
View 19 Excerpts
Highly Influenced

Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes

ACM Conference on Computer and Communications Security • 2015
View 6 Excerpts
Highly Influenced

Information Security and Privacy

Lecture Notes in Computer Science • 2015
View 20 Excerpts
Highly Influenced

Certified Synthesis of Efficient Batch Verifiers

2014 IEEE 27th Computer Security Foundations Symposium • 2014
View 6 Excerpts
Highly Influenced

Self-Updatable Encryption with Short Public Parameters and Its Extensions

IACR Cryptology ePrint Archive • 2014
View 11 Excerpts
Highly Influenced

802 Citations

050100'10'13'16'19
Citations per Year
Semantic Scholar estimates that this publication has 802 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 27 references

Practical Identity-Based Encryption Without Random Oracles

EUROCRYPT • 2006
View 8 Excerpts
Highly Influenced

Secure Identity Based Encryption Without Random Oracles

IACR Cryptology ePrint Archive • 2004
View 5 Excerpts
Highly Influenced

A Forward-Secure Public-Key Encryption Scheme

Journal of Cryptology • 2002
View 4 Excerpts
Highly Influenced

Hierarchical ID-Based Cryptography

IACR Cryptology ePrint Archive • 2002
View 17 Excerpts
Highly Influenced

Toward Hierarchical Identity-Based Encryption

EUROCRYPT • 2002
View 17 Excerpts
Highly Influenced

Delegating Capabilities in Predicate Encryption Systems

IACR Cryptology ePrint Archive • 2008
View 6 Excerpts

Similar Papers

Loading similar papers…