Abstract
The key encapsulation mechanism (KEM) and the data encapsulation mechanism (DEM) form a hybrid encryption, which effectively solves the problem of low efficiency of public key cryptography and key distribution problems in symmetric encryption system. The security and efficiency of the key encapsulation mechanism directly affect the security and efficiency of hybrid encryption. In this paper, an identity-based key encapsulation scheme is constructed by using multilinear mapping. We proved that the scheme is under the standard model of adaptive chosen-ciphertext security. The scheme can be publicly verified and the key and ciphertext length are constant and have high efficiency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) Advances in Cryptology. Springer, Heidelberg (1984). Lecture Notes in Computer Science, 21(2)
Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 33(1), 167–226 (2004)
Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic constructions of identity-based and certificateless kems. J. Cryptology 21(2), 178–199 (2008)
Ran, C., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. SIAM J. Comput. 36(5), 1301–1328 (2007)
Boneh, D., Katz, J.: Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. In: Menezes, A. (ed.) Topics in Cryptology, vol. 261. Springer, Heidelberg (2005)
Boyen, X., Mei, Q., Waters, B.: Direct chosen ciphertext security from identity-based techniques. In: ACM Conference on Computer and Communications Security, pp. 320–329 (2005)
Cheng, Z., Malonelee, J., Chen, L., Smart, N.P.: Efficient id-kem based on the sakai–kasahara key construction. Inf. Secur. IEE Proc. 153(1), 19–26 (2006)
Kiltz, E., Galindo, D.: Direct chosen-ciphertext secure identity-based key encapsulation without random oracles. In: Australasian Conference on Information Security and Privacy, pp. 336–347 (2006)
Long, Y., Chen, K.: Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism. Inf. Sci. 180(7), 1167–1181 (2010)
Lippold, G., Boyd, C., Nieto, J.M.G.: Efficient certificateless KEM in the standard model. In: International Conference on Information Security and Cryptology, 34–46 (2009)
Li, J., Huang, X., Mu, Y., Susilo, W., Wu, Q.: Constructions of certificate-based signature secure against key replacement attacks. J. Comput. Secur. 18(3), 421–449 (2010)
Li, J., Huang, X., Mu, Y., Susilo, W., Wu, Q.: Certificate-based signature: security model and efficient construction. In: Public Key Infrastructure, European Pki Workshop: Theory and Practice, Europki 2007, pp. 110–125 (2007)
Li, J., Huang, X., Zhang, Y., Xu, L.: An efficient short certificate-based signature scheme. J. Syst. Softw. 85(2), 314–322 (2012)
Zhang, M., Zhang, T., Wang, X.: Publicly Verifiable Encryption in Multilinear Maps[J]. J. Wuhan Univ. Nat. Sci. Ed. 2014(6), 507–512 (2014)
Wang, H., Wu, L., Zheng, Z., Wang, Y.: Identity-based key-encapsulation mechanism from multilinear maps. IACR Cryptology ePrint Archive 2013/836
Wei, Z.: A Pairing-based homomorphic encryption scheme for multi-user settings. Int. J. Technol. Hum. Interact. (IJTHI) 12(2), 72–82 (2016)
Chen, Y., Chen, X., Li, H.: More dcca-secure public-key encryptions from KEM + DEM style hybrid paradigms and some observations on the ‘inner-outer’ structure. Int. J. Grid Util. Comput. 5(1), 60–70 (2014)
Li, S., Zhang, F.: Leakage-resilient identity-based encryption scheme. Int. J. Grid Util. Comput. 4(2/3), 187–196 (2013)
Chen, H., Hu, Y., Lian, Z., Jia, H., Wang, X.A.: An additively homomorphic encryption over large message space. Int. J. Inf. Technol. Web. Eng. 10(3), 82–102 (2015)
Ma, J., Zhang, Y., Wang, Z., Yu, K.: A message topic model for multi-grain SMS spam filtering. Int. J. Technol. Hum. Interact. (IJTHI) 12(2), 83–95 (2016)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Lv, L., Sun, W., Yang, X., Wang, X. (2018). Key Encapsulation Mechanism from Multilinear Maps. In: Barolli, L., Zhang, M., Wang, X. (eds) Advances in Internetworking, Data & Web Technologies. EIDWT 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 6. Springer, Cham. https://doi.org/10.1007/978-3-319-59463-7_35
Download citation
DOI: https://doi.org/10.1007/978-3-319-59463-7_35
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-59462-0
Online ISBN: 978-3-319-59463-7
eBook Packages: EngineeringEngineering (R0)