File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-319-12475-9_26
- Scopus: eid_2-s2.0-84910007714
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Complete robustness in identity-based encryption
Title | Complete robustness in identity-based encryption |
---|---|
Authors | |
Keywords | RKA security Identity-based encryption CROB |
Issue Date | 2014 |
Publisher | Springer. |
Citation | Complete robustness in identity-based encryption. In Provable Security. in Cui, H, Mu, Y, Au, MH (Eds.), Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014: Proceedings, p. 342-349. Cham, Switzerland: Springer, 2014 How to Cite? |
Abstract | © Springer International Publishing Switzerland 2014. Complete robustness (CROB) was proposed to guarantee that for a public key encryption scheme, decryption attempts will fail with high probability if the wrong decryption key is used to decrypt a ciphertext, even if the keys are maliciously generated by the adversary. In this paper, we extend the notion of complete robustness to the identity-based setting. We firstly formalize the CROB for identity-based encryption, and present a generic construction achieving CROB from an arbitrary identity-based encryption scheme. After that, we investigate whether there exist some kind of relations between CROB and relatedkey attack (RKA) security for the case of identity-based encryption. We conclude that these two notions (CROB and RKA security) are separable for identity-based encryption, but with a slight modification to our generic construction, an identity-based encryption scheme offering complete robustness with security against related-key attacks can be constructed from any identity-based encryption scheme. |
Persistent Identifier | http://hdl.handle.net/10722/280557 |
ISBN | |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
Series/Report no. | Lecture Notes in Computer Science ; 8782 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cui, Hui | - |
dc.contributor.author | Mu, Yi | - |
dc.contributor.author | Au, Man Ho | - |
dc.date.accessioned | 2020-02-17T14:34:21Z | - |
dc.date.available | 2020-02-17T14:34:21Z | - |
dc.date.issued | 2014 | - |
dc.identifier.citation | Complete robustness in identity-based encryption. In Provable Security. in Cui, H, Mu, Y, Au, MH (Eds.), Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014: Proceedings, p. 342-349. Cham, Switzerland: Springer, 2014 | - |
dc.identifier.isbn | 9783319124742 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280557 | - |
dc.description.abstract | © Springer International Publishing Switzerland 2014. Complete robustness (CROB) was proposed to guarantee that for a public key encryption scheme, decryption attempts will fail with high probability if the wrong decryption key is used to decrypt a ciphertext, even if the keys are maliciously generated by the adversary. In this paper, we extend the notion of complete robustness to the identity-based setting. We firstly formalize the CROB for identity-based encryption, and present a generic construction achieving CROB from an arbitrary identity-based encryption scheme. After that, we investigate whether there exist some kind of relations between CROB and relatedkey attack (RKA) security for the case of identity-based encryption. We conclude that these two notions (CROB and RKA security) are separable for identity-based encryption, but with a slight modification to our generic construction, an identity-based encryption scheme offering complete robustness with security against related-key attacks can be constructed from any identity-based encryption scheme. | - |
dc.language | eng | - |
dc.publisher | Springer. | - |
dc.relation.ispartof | Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014: Proceedings | - |
dc.relation.ispartofseries | Lecture Notes in Computer Science ; 8782 | - |
dc.subject | RKA security | - |
dc.subject | Identity-based encryption | - |
dc.subject | CROB | - |
dc.title | Complete robustness in identity-based encryption | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/978-3-319-12475-9_26 | - |
dc.identifier.scopus | eid_2-s2.0-84910007714 | - |
dc.identifier.spage | 342 | - |
dc.identifier.epage | 349 | - |
dc.identifier.eissn | 1611-3349 | - |
dc.publisher.place | Cham, Switzerland | - |
dc.identifier.issnl | 0302-9743 | - |