Cryptology ePrint Archive: Report 2010/141
A Reflection on the Security Proofs of Boneh-Franklin Identity-Based Encryption
Yu Chen
Abstract: Boneh and Franklin constructed the first practical Identity-Based Encryption scheme (BF-IBE) [1] and
proved its security based on the computational Bilinear Diffie-Hellman assumption (CBDH) in 2001. The correct-
ness of its security proof was long believed to be correct until in 2005, Galindo [2] noticed a flawed step in the
original proof. In the same paper, Galindo provided a new proof with a looser security reduction. Shortly after-
wards, Nishioka [3] improved Galindo’s proof to achieve a tighter security reduction. In the same year, Zhang and
Imai [4] gave another proof of BF-IBE. Unfortunately, we find that none of their proofs is flawless. In this paper,
besides identifying and fixing the lapses in previous proofs, we present two new proofs for the CCA security of
BF-IBE. The first proof is proved via selective-identity security with imposing a natural constraint to the original
scheme. The second proof is proved by directly reducing the security to a stronger assumption, namely the gap
Bilinear Diffie-Hellman (GBDH) assumption.
Category / Keywords: IBE, provable security, security reduction, BDH assumption
Date: received 14 Mar 2010, last revised 19 Apr 2010, withdrawn 25 Aug 2010
Contact author: cycosmic at gmail com
Available format(s): (-- withdrawn --)
Note: Correct some errors.
Version: 20100825:145938 (All versions of this report)
Short URL: ia.cr/2010/141
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]