Loading...
Please wait, while we are loading the content...
Similar Documents
Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme
| Content Provider | Semantic Scholar |
|---|---|
| Author | Chen, Yu Chen, Liqun Lin, Dongdai |
| Copyright Year | 2013 |
| Abstract | In this paper, we first review the existing proofs of the Boneh-Franklin identity-based encryption scheme (BF-IBE for short), and show how to admit a new proof by slightly modifying the specifications of the hash functions of the original BF-IBE. Compared with prior proofs, our new proof provides a tighter security reduction and minimizes the use of random oracles, thus indicates BF-IBE has better provable security with our new choices of hash functions. The techniques developed in our proof can also be applied to improving security analysis of some other IBE schemes. As an independent technical contribution, we also give a rigorous proof of the Fujisaki-Okamoto (FO) transformation in the case of CPA-to-CCA, which demonstrates the efficiency of the FO-transformation (CPA-to-CCA), in terms of the tightness of security reduction, has long been underestimated. This result can remarkably benefit the security proofs of encryption schemes using the FO-transformation for CPA-to-CCA enhancement. |
| Starting Page | 1385 |
| Ending Page | 1401 |
| Page Count | 17 |
| File Format | PDF HTM / HTML |
| DOI | 10.1007/s11425-013-4673-2 |
| Volume Number | 56 |
| Alternate Webpage(s) | https://d89b0030-a-62cb3a1a-s-sites.googlegroups.com/site/yuchencas/home/ScienceChinaMath2013-paper.pdf?attachauth=ANoY7crWfWMaRgIBI8j4PzBMZseF-kRfBQlM7PzEZT1SzrJ0VMyRSal5N63pPXjRq6CggUU0BC32NT80msGtgxTTcaVu0edOeLvKWSoN7ytwhYL1BKz6evoxNnSq_d_81wJqRcUmZAJyBBCLPmzzG4lNHBRFel1LccNAEFt7OwJAolEaVUDgZvxqifdTMI1aYoFQracEfcjsAtEQbwnp5bbhjNmgriirGnehnHeOiMdBBkuutAH48OQ%3D&attredirects=1 |
| Alternate Webpage(s) | https://doi.org/10.1007/s11425-013-4673-2 |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |