Nothing Special   »   [go: up one dir, main page]

Skip to main content

Key Encapsulation Mechanism from Multilinear Maps

  • Conference paper
  • First Online:
Advances in Internetworking, Data & Web Technologies (EIDWT 2017)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 6))

  • 1410 Accesses

Abstract

The key encapsulation mechanism (KEM) and the data encapsulation mechanism (DEM) form a hybrid encryption, which effectively solves the problem of low efficiency of public key cryptography and key distribution problems in symmetric encryption system. The security and efficiency of the key encapsulation mechanism directly affect the security and efficiency of hybrid encryption. In this paper, an identity-based key encapsulation scheme is constructed by using multilinear mapping. We proved that the scheme is under the standard model of adaptive chosen-ciphertext security. The scheme can be publicly verified and the key and ciphertext length are constant and have high efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) Advances in Cryptology. Springer, Heidelberg (1984). Lecture Notes in Computer Science, 21(2)

    Google Scholar 

  2. Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 33(1), 167–226 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  3. Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic constructions of identity-based and certificateless kems. J. Cryptology 21(2), 178–199 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  4. Ran, C., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. SIAM J. Comput. 36(5), 1301–1328 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  5. Boneh, D., Katz, J.: Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. In: Menezes, A. (ed.) Topics in Cryptology, vol. 261. Springer, Heidelberg (2005)

    Google Scholar 

  6. Boyen, X., Mei, Q., Waters, B.: Direct chosen ciphertext security from identity-based techniques. In: ACM Conference on Computer and Communications Security, pp. 320–329 (2005)

    Google Scholar 

  7. Cheng, Z., Malonelee, J., Chen, L., Smart, N.P.: Efficient id-kem based on the sakai–kasahara key construction. Inf. Secur. IEE Proc. 153(1), 19–26 (2006)

    Article  Google Scholar 

  8. Kiltz, E., Galindo, D.: Direct chosen-ciphertext secure identity-based key encapsulation without random oracles. In: Australasian Conference on Information Security and Privacy, pp. 336–347 (2006)

    Google Scholar 

  9. Long, Y., Chen, K.: Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism. Inf. Sci. 180(7), 1167–1181 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  10. Lippold, G., Boyd, C., Nieto, J.M.G.: Efficient certificateless KEM in the standard model. In: International Conference on Information Security and Cryptology, 34–46 (2009)

    Google Scholar 

  11. Li, J., Huang, X., Mu, Y., Susilo, W., Wu, Q.: Constructions of certificate-based signature secure against key replacement attacks. J. Comput. Secur. 18(3), 421–449 (2010)

    Article  Google Scholar 

  12. Li, J., Huang, X., Mu, Y., Susilo, W., Wu, Q.: Certificate-based signature: security model and efficient construction. In: Public Key Infrastructure, European Pki Workshop: Theory and Practice, Europki 2007, pp. 110–125 (2007)

    Google Scholar 

  13. Li, J., Huang, X., Zhang, Y., Xu, L.: An efficient short certificate-based signature scheme. J. Syst. Softw. 85(2), 314–322 (2012)

    Article  Google Scholar 

  14. Zhang, M., Zhang, T., Wang, X.: Publicly Verifiable Encryption in Multilinear Maps[J]. J. Wuhan Univ. Nat. Sci. Ed. 2014(6), 507–512 (2014)

    Article  MATH  Google Scholar 

  15. Wang, H., Wu, L., Zheng, Z., Wang, Y.: Identity-based key-encapsulation mechanism from multilinear maps. IACR Cryptology ePrint Archive 2013/836

    Google Scholar 

  16. Wei, Z.: A Pairing-based homomorphic encryption scheme for multi-user settings. Int. J. Technol. Hum. Interact. (IJTHI) 12(2), 72–82 (2016)

    Article  Google Scholar 

  17. Chen, Y., Chen, X., Li, H.: More dcca-secure public-key encryptions from KEM + DEM style hybrid paradigms and some observations on the ‘inner-outer’ structure. Int. J. Grid Util. Comput. 5(1), 60–70 (2014)

    Article  Google Scholar 

  18. Li, S., Zhang, F.: Leakage-resilient identity-based encryption scheme. Int. J. Grid Util. Comput. 4(2/3), 187–196 (2013)

    Article  Google Scholar 

  19. Chen, H., Hu, Y., Lian, Z., Jia, H., Wang, X.A.: An additively homomorphic encryption over large message space. Int. J. Inf. Technol. Web. Eng. 10(3), 82–102 (2015)

    Article  Google Scholar 

  20. Ma, J., Zhang, Y., Wang, Z., Yu, K.: A message topic model for multi-grain SMS spam filtering. Int. J. Technol. Hum. Interact. (IJTHI) 12(2), 83–95 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Lv, L., Sun, W., Yang, X., Wang, X. (2018). Key Encapsulation Mechanism from Multilinear Maps. In: Barolli, L., Zhang, M., Wang, X. (eds) Advances in Internetworking, Data & Web Technologies. EIDWT 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 6. Springer, Cham. https://doi.org/10.1007/978-3-319-59463-7_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59463-7_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59462-0

  • Online ISBN: 978-3-319-59463-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics