TY - GEN
T1 - New assumptions on isogenous pairing groups with applications to attribute-based encryption
AU - Koshiba, Takeshi
AU - Takashima, Katsuyuki
N1 - Publisher Copyright:
© 2019, Springer Nature Switzerland AG.
PY - 2019
Y1 - 2019
N2 - We introduce new isogeny-related assumptions called Isog-DDH and Isog-DBDH assumptions. By using the assumptions, we reinforce security of several existing (hierarchical) identity-/attribute-based encryption (HIBE/ABE) schemes. While the existing schemes are proven from the standard DBDH assumption, our reinforced secure ones have two incomparable security proofs: one is proven from the DBDH as well and another is proven from the Isog-DDH assumption which is incomparable with DBDH. As a result, if either DBDH or Isog-DDH assumption holds, the proposed HIBE/ABE schemes are secure. For obtaining our (H)IBE secure in the standard model, we assign a unique (product) group called ID-group to each (H)ID, and introduce a new proof technique, i.e., ID-group partitioning by using isogenies as trapdoors.
AB - We introduce new isogeny-related assumptions called Isog-DDH and Isog-DBDH assumptions. By using the assumptions, we reinforce security of several existing (hierarchical) identity-/attribute-based encryption (HIBE/ABE) schemes. While the existing schemes are proven from the standard DBDH assumption, our reinforced secure ones have two incomparable security proofs: one is proven from the DBDH as well and another is proven from the Isog-DDH assumption which is incomparable with DBDH. As a result, if either DBDH or Isog-DDH assumption holds, the proposed HIBE/ABE schemes are secure. For obtaining our (H)IBE secure in the standard model, we assign a unique (product) group called ID-group to each (H)ID, and introduce a new proof technique, i.e., ID-group partitioning by using isogenies as trapdoors.
KW - Attribute-based encryption
KW - Identity-based encryption
KW - Isogenous pairing groups
KW - Security reinforcement
UR - http://www.scopus.com/inward/record.url?scp=85061098823&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85061098823&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-12146-4_1
DO - 10.1007/978-3-030-12146-4_1
M3 - Conference contribution
AN - SCOPUS:85061098823
SN - 9783030121457
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 3
EP - 19
BT - Information Security and Cryptology – ICISC 2018 - 21st International Conference, Revised Selected Papers
A2 - Lee, Kwangsu
PB - Springer Verlag
T2 - 21st International Conference on Information Security and Cryptology, ICISC 2018
Y2 - 28 November 2018 through 30 November 2018
ER -