Publication | Closed Access
Practical leakage-resilient identity-based encryption from simple assumptions
152
Citations
9
References
2010
Year
Unknown Venue
Hardware SecuritySimple AssumptionsBounded Retrieval ModelEngineeringCryptographic PrimitiveInformation SecurityCryptographic ProtectionCryptographic TechnologyStandard ModelFormal MethodsData PrivacyStatic AssumptionsLightweight CryptographyCloud CryptographyComputer ScienceFormal VerificationData SecurityCryptography
We design the first Leakage-Resilient Identity-Based Encryption (LR-IBE) systems from static assumptions in the standard model. We derive these schemes by applying a hash proof technique from Alwen et.al. (Eurocrypt '10) to variants of the existing IBE schemes of Boneh-Boyen, Waters, and Lewko-Waters. As a result, we achieve leakage-resilience under the respective static assumptions of the original systems in the standard model, while also preserving the efficiency of the original schemes. Moreover, our results extend to the Bounded Retrieval Model (BRM), yielding the first regular and identity-based BRM encryption schemes from static assumptions in the standard model.
| Year | Citations | |
|---|---|---|
Page 1
Page 1