Chosen-ciphertext security from identity-based encryption

Dan Boneht*, Ran Canetti, Shai Halevi, Jonathan Katz

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

248 Scopus citations

Abstract

We propose simple and efficient CCA-secure public-key encryption schemes (i.e., schemes secure against adaptive chosen-ciphertext attacks) based on any identity-based encryption (IBE) scheme. Our constructions have ramifications of both theoretical and practical interest. First, our schemes give a new paradigm for achieving CCA-security; this paradigm avoids "proofs of wellformedness" that have been shown to underlie previous constructions. Second, instantiating our construction using known IBE constructions we obtain CCA-secure encryption schemes whose performance is competitive with the most efficient CCA-secure schemes to date. Our techniques extend naturally to give an efficient method for securing IBE schemes (even hierarchical ones) against adaptive chosen-ciphertext attacks. Coupled with previous work, this gives the first efficient constructions of CCA-secure IBE schemes.

Original languageEnglish
Pages (from-to)1301-1328
Number of pages28
JournalSIAM Journal on Computing
Volume36
Issue number5
DOIs
StatePublished - 2006
Externally publishedYes

Keywords

  • Chosen-ciphertext security
  • Identity-based encryption
  • Public-key encryption

Fingerprint

Dive into the research topics of 'Chosen-ciphertext security from identity-based encryption'. Together they form a unique fingerprint.

Cite this