Our constructions of IBE are very simple. We construct our KDM secure IBE by transforming KDM secure secret-key encryption using IBE satisfying only ordinary indistinguishability against adaptive-ID attacks (IND-ID-CPA security). Our simulation-based RSO secure IBE is based only on IND-ID-CPA secure IBE.
We also demonstrate that our construction technique for KDM secure IBE is used to construct KDM secure public-key encryption. More precisely, we show how to construct KDM secure public-key encryption from KDM secure secret-key encryption and public-key encryption satisfying only ordinary indistinguishability against chosen plaintext attacks.
Category / Keywords: public-key cryptography / Identity-based encryption, Key dependent message security, Receiver selective opening security Original Publication (with minor differences): IACR-PKC-2018 Date: received 7 Oct 2017, last revised 12 Jan 2018 Contact author: kitagaw1 at is titech ac jp Available format(s): PDF | BibTeX Citation Version: 20180112:080414 (All versions of this report) Short URL: ia.cr/2017/987