From Selective-ID to Full-ID IBS without Random Oracles


Autoria(s): Chatterjee, Sanjit; Kamath, Chethan
Data(s)

2013

Resumo

Since its induction, the selective-identity (sID) model for identity-based cryptosystems and its relationship with various other notions of security has been extensively studied. As a result, it is a general consensus that the sID model is much weaker than the full-identity (ID) model. In this paper, we study the sID model for the particular case of identity-based signatures (IBS). The main focus is on the problem of constructing an ID-secure IBS given an sID-secure IBS without using random oracles-the so-called standard model-and with reasonable security degradation. We accomplish this by devising a generic construction which uses as black-box: i) a chameleon hash function and ii) a weakly-secure public-key signature. We argue that the resulting IBS is ID-secure but with a tightness gap of O(q(s)), where q(s) is the upper bound on the number of signature queries that the adversary is allowed to make. To the best of our knowledge, this is the first attempt at such a generic construction.

Formato

application/pdf

Identificador

http://eprints.iisc.ernet.in/49912/1/sec_pri_app_cry_eng_spa_8204_172_2013.pdf

Chatterjee, Sanjit and Kamath, Chethan (2013) From Selective-ID to Full-ID IBS without Random Oracles. In: 3rd International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE), OCT 19-23, 2013, Indian Inst Technol Kharagpur, Kharagpur, INDIA, pp. 172-190.

Relação

http://clweb.csa.iisc.ernet.in/chethan0510/Resources/Documents/CK13b.pdf

http://eprints.iisc.ernet.in/49912/

Palavras-Chave #Computer Science & Automation (Formerly, School of Automation)
Tipo

Conference Proceedings

NonPeerReviewed