@inbook{9b755b942dca4d38a27ea36bc54389b1,
title = "Chosen-ciphertext security from identity-based encryption",
abstract = "We propose a simple and efficient construction of a CCAsecure public-key encryption scheme from any CPA-secure identity-based encryption (IBE) scheme. Our construction requires the underlying IBE scheme to satisfy only a relatively {"}weak{"} notion of security which is known to be achievable without random oracles; thus, our results provide a new approach for constructing CCA-secure encryption schemes in the standard model. Our approach is quite different from existing ones; in particular, it avoids non-interactive proofs of {"}well-formedness{"} which were shown to underlie most previous constructions. Furthermore, applying our conversion to some recently-proposed IBE schemes results in CCA-secure schemes whose efficiency makes them quite practical. Our technique extends to give a simple and reasonably efficient method for securing any binary tree encryption (BTE) scheme against adaptive chosen-ciphertext attacks. This, in turn, yields more efficient CCA-secure hierarchical identity-based and forward-secure encryption schemes in the standard model.",
keywords = "Chosen-ciphertext security, Forward-secure encryption, Identitybased encryption, Public-key encryption",
author = "Ran Canetti and Shai Halevi and Jonathan Katz",
year = "2004",
doi = "10.1007/978-3-540-24676-3_13",
language = "אנגלית",
isbn = "3540219358",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "207--222",
editor = "Christian Cachin and Jan Camenisch",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
}