Paper 2019/982

CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not $\mathtt{q}$-type) Assumptions

Toi Tomita, Wakaha Ogata, Kaoru Kurosawa, and Ryo Kuwayama

Abstract

In this paper, we propose a new leakage-resilient identity-based encryption (IBE) scheme that is secure against chosen-ciphertext attacks (CCA) in the bounded memory leakage model. It is the first CCA-secure leakage-resilient IBE scheme which does not depend on $\mathtt{q}$-type assumptions. More precisely, it is secure under the external k-Linear assumption. The leakage rate 1/10 is achieved under the XDLIN assumption.

Note: This is an extended version of the paper presented in IWSEC 2019.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Major revision.The 14th International Workshop on Security (IWSEC 2019)
Keywords
public-key cryptography
Contact author(s)
ogata w aa @ m titech ac jp
History
2019-11-29: revised
2019-08-29: received
See all versions
Short URL
https://ia.cr/2019/982
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/982,
      author = {Toi Tomita and Wakaha Ogata and Kaoru Kurosawa and Ryo Kuwayama},
      title = {CCA-Secure Leakage-Resilient Identity-Based  Key-Encapsulation from Simple (not $\mathtt{q}$-type) Assumptions},
      howpublished = {Cryptology ePrint Archive, Paper 2019/982},
      year = {2019},
      note = {\url{https://eprint.iacr.org/2019/982}},
      url = {https://eprint.iacr.org/2019/982}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.