# Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles

@inproceedings{Boneh2004EfficientSS, title={Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles}, author={Dan Boneh and Xavier Boyen}, booktitle={IACR Cryptology ePrint Archive}, year={2004} }

We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model. Selective identity secure IBE is a slightly weaker security model than the standard security model for IBE. In this model the adversary must commit ahead of time to the identity that it intends to attack, whereas in the standard model the adversary is allowed to choose this identity adaptively. Our first secure IBE system extends to give a selective identity…

## 1,753 Citations

### Efficient Identity-Based Encryption Without Random Oracles

- Computer Science, MathematicsEUROCRYPT
- 2005

This work first presents their IBE construction and reduces the security of the scheme to the decisional Bilinear Diffie-Hellman (BDH) problem, and shows that their techniques can be used to build a new signature scheme that is secure under the computational Diffie -Hellman assumption without random oracles.

### Efficient Selective Identity-Based Encryption Without Random Oracles

- Computer Science, MathematicsJournal of Cryptology
- 2010

We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity security reductions without random oracles in groups equipped with a bilinear map. Selective-identity…

### Chosen-Ciphertext Security from Identity-Based Encryption

- Computer Science, MathematicsSIAM J. Comput.
- 2007

This work proposes a simple and efficient construction of a CCA-secure public-key encryption scheme from any CPA-secure identity-based encryption (IBE) scheme, which avoids non-interactive proofs of “well-formedness” which were shown to underlie most previous constructions.

### Lattice Forward-Secure Identity Based Encryption Scheme

- Computer Science, MathematicsJ. Internet Serv. Inf. Secur.
- 2012

This paper proposes lattice based forward-secure identity based encryption scheme based on LWE assumption in random oracle model in the standard model.

### Cryptanalysis of an identity based broadcast encryption scheme without random oracles

- Computer Science, MathematicsInf. Process. Lett.
- 2011

### Generic Construction of Forward-Secure Identity-Based Encryption

- Computer Science, MathematicsJ. Comput.
- 2012

A generic construction of forward-secure identity-based encryption is proposed that guarantees that even if the current private keys are compromised, it is not possible to compromise past secret keys and past communications.

### New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts

- Computer Science, MathematicsISPEC
- 2011

A new HIBE scheme with constant size ciphertexts and short parameters in prime order groups using symmetric pairing is proposed and a new technique called "hybrid identity vector" is used to make the key derivation feasible.

### Certificate-Based Encryption Without Random Oracles

- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2006

This work presents a certificate-based encryption scheme which is fully secure in the standard model and points out that one of the existing generic constructions going from IBE to CBE is flawed.

### Forward-Secure Identity-Based Public-Key Encryption without Random Oracles

- Computer Science, MathematicsFundam. Informaticae
- 2011

This work proposes a forward-secure identity-based public-key encryption scheme without random oracles, which is the first forward- Secure Identity-based Public-key Encryption Scheme without Random Oracles.

### Identity-Based Encryption Secure against Selective Opening Attack

- Computer Science, MathematicsTCC
- 2010

We present the first IBE schemes that are proven secure against selective opening attack (SOA). This means that if an adversary, given a vector of ciphertexts, adaptively corrupts some fraction of…

## References

SHOWING 1-10 OF 33 REFERENCES

### Efficient Identity-Based Encryption Without Random Oracles

- Computer Science, MathematicsEUROCRYPT
- 2005

This work first presents their IBE construction and reduces the security of the scheme to the decisional Bilinear Diffie-Hellman (BDH) problem, and shows that their techniques can be used to build a new signature scheme that is secure under the computational Diffie -Hellman assumption without random oracles.

### Secure Identity Based Encryption Without Random Oracles

- Computer Science, MathematicsCRYPTO
- 2004

We present a fully secure Identity Based Encryption scheme whose proof of security does not rely on the random oracle heuristic. Security is based on the Decision Bilinear Diffie-Hellman assumption.…

### Identity-Based Encryption from the Weil Pairing

- Computer Science, MathematicsCRYPTO
- 2001

This work proposes a fully functional identity-based encryption scheme (IBE) based on the Weil pairing that has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem.

### Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption

- Computer Science, MathematicsCT-RSA
- 2005

This work improves the efficiency of their construction, and shows two specific instantiations of the resulting scheme which offer the most efficient encryption (and, in one case, key generation) of any CCA-secure encryption scheme to date.

### An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack

- Computer Science, MathematicsEUROCRYPT
- 1999

This paper proposes a simple threshold Public-Key Cryptosystem (PKC) which is secure against adaptive chosen ciphertext attack, under the Decisional Diffie-Hellman (DDH) intractability assumption.…

### Short Signatures Without Random Oracles

- Computer Science, MathematicsEUROCRYPT
- 2004

A short signature scheme which is existentially unforgeable under a chosen message attack without using random oracles, which depends on a new complexity assumption the authors call the Strong Diffie-Hellman assumption.

### A New Paradigm of Hybrid Encryption Scheme

- Computer Science, MathematicsCRYPTO
- 2004

It is shown that a key encapsulation mechanism (KEM) does not have to be IND-CCA secure in the construction of hybrid encryption schemes, as was previously believed, and this result is further generalized to universal2 projective hash families.

### A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions

- Computer Science, MathematicsJournal of Cryptology
- 2005

A simpler construction of a public-key encryption scheme that achieves adaptive chosen ciphertext security (CCA2), assuming the existence of trapdoor permutations is presented, which is believed to be the easiest to understand to date.

### A Forward-Secure Public-Key Encryption Scheme

- Computer Science, MathematicsJournal of Cryptology
- 2006

The first constructions of (non-interactive) forward-secure public-key encryption schemes are presented and the main construction achieves security against chosen-plaintext attacks in the standard model, and all parameters are poly-logarithmic in the total number of time periods.

### Public-key cryptosystems provably secure against chosen ciphertext attacks

- Computer Science, MathematicsSTOC '90
- 1990

We show how to construct a public-key cryptosystem (as originally defined by DiNe and Hellman) secure against chosen ciphertezt attacks, given a public-key cryptosystern secure against passive…