Short Hierarchical Identity-based Encryption in the Selective-ID Model

Recently Zhang et al. proposed a hierarchical identity-based encryption scheme which is the first efficient scheme where both ciphertexts and private keys achieve O(1)size, and is the best trade-off between private key size and ciphertext size at present. However, in this paper, it will be pointed out that their scheme exists an ambiguity or shortcoming which makes their scheme be insecure or non identity-based. Then,  in order to overcome this problem, an improved hierarchical identity based encryption scheme is proposed with the same efficiency with Zhang et al.’s scheme (the private keys and ciphertexts of O(1)size). And, the security proof of the improved scheme also is given in the selective-identity model.

[1]  Wei Yuan,et al.  Analysis and Enhancement of Three Identity-based Signcryption Protocols , 2012, J. Comput..

[2]  Dan Boneh,et al.  Efficient Lattice (H)IBE in the Standard Model , 2010, EUROCRYPT.

[3]  Dan Boneh,et al.  Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.

[4]  Yang Lu,et al.  Generic Construction of Forward-Secure Identity-Based Encryption , 2012, J. Comput..

[5]  Koutarou Suzuki,et al.  Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts , 2011, IACR Cryptol. ePrint Arch..

[6]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[7]  Craig Gentry,et al.  Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.

[8]  Yanli Ren,et al.  Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model , 2008, Informatica.

[9]  Liang Yan,et al.  Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography , 2009, CloudCom.

[10]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[11]  Brent Waters,et al.  Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..

[12]  Wei Yuan,et al.  Cryptanalysis and Improvement of an ID-Based Threshold Signcryption Scheme , 2012, J. Comput..

[13]  Yupu Hu,et al.  Hierarchical Identity‐Based Encryption with Constant‐Size Private Keys , 2012 .

[14]  David Cash,et al.  How to Delegate a Lattice Basis , 2009, IACR Cryptol. ePrint Arch..

[15]  Fei Li,et al.  An Efficient Certificateless Threshold Decryption Schemes Based On Pairings , 2012, J. Comput..

[16]  Allison Bishop,et al.  New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts , 2010, IACR Cryptol. ePrint Arch..