TY - GEN
T1 - Practical leakage-resilient identity-based encryption from simple assumptions
AU - Chow, Sherman S.M.
AU - Dodis, Yevgeniy
AU - Rouselakis, Yannis
AU - Waters, Brent
PY - 2010
Y1 - 2010
N2 - We design the first Leakage-Resilient Identity-Based Encryption (LR-IBE) systems from static assumptions in the standard model. We derive these schemes by applying a hash proof technique from Alwen et al.(Eurocrypt '10) to variants of the existing IBE schemes of Boneh-Boyen, Waters, and Lewko-Waters. As a result, we achieve leakage-resilience under the respective static assumptions of the original systems in the standard model, while also preserving the efficiency of the original schemes. Moreover, our results extend to the Bounded Retrieval Model (BRM), yielding the first regular and identity-based BRM encryption schemes from static assumptions in the standard model. The first LR-IBE system, based on Boneh-Boyen IBE, is only selectively secure under the simple Decisional Bilinear Diffie-Hellman assumption (DBDH), and serves as a stepping stone to our second fully secure construction. This construction is based on Waters IBE, and also relies on the simple DBDH. Finally, the third system is based on Lewko- Waters IBE, and achieves full security with shorter public parameters, but is based on three static assumptions related to composite order bilinear groups.
AB - We design the first Leakage-Resilient Identity-Based Encryption (LR-IBE) systems from static assumptions in the standard model. We derive these schemes by applying a hash proof technique from Alwen et al.(Eurocrypt '10) to variants of the existing IBE schemes of Boneh-Boyen, Waters, and Lewko-Waters. As a result, we achieve leakage-resilience under the respective static assumptions of the original systems in the standard model, while also preserving the efficiency of the original schemes. Moreover, our results extend to the Bounded Retrieval Model (BRM), yielding the first regular and identity-based BRM encryption schemes from static assumptions in the standard model. The first LR-IBE system, based on Boneh-Boyen IBE, is only selectively secure under the simple Decisional Bilinear Diffie-Hellman assumption (DBDH), and serves as a stepping stone to our second fully secure construction. This construction is based on Waters IBE, and also relies on the simple DBDH. Finally, the third system is based on Lewko- Waters IBE, and achieves full security with shorter public parameters, but is based on three static assumptions related to composite order bilinear groups.
KW - Bounded retrieval model
KW - Dual system encryption
KW - Hash proof system
KW - Identity based encryption
KW - Leakage resilience
UR - http://www.scopus.com/inward/record.url?scp=78649985218&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78649985218&partnerID=8YFLogxK
U2 - 10.1145/1866307.1866325
DO - 10.1145/1866307.1866325
M3 - Conference contribution
AN - SCOPUS:78649985218
SN - 9781450302449
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 152
EP - 161
BT - CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security
T2 - 17th ACM Conference on Computer and Communications Security, CCS'10
Y2 - 4 October 2010 through 8 October 2010
ER -