
Identity-Based Encryption with Tight Security in Multi-Instance Setting
Explore the concept of Identity-Based Encryption (IBE) with nearly tight security in a multi-instance, multi-ciphertext setting. This study delves into the proof idea underlying the IBE scheme and achieves almost tight security for Multi-Instance, Multi-Ciphertext IBE, focusing on IBE-IND-CPA and tight security aspects. The goal is to enhance security while reducing key sizes and overall complexity. Dive into the intricate details of IBE security and proof mechanisms proposed by Dennis Hofheinz, Jessica Koch, and Christoph Striecks from the Karlsruhe Institute of Technology, Germany.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting Dennis Hofheinz, Jessica Koch, Christoph Striecks Karlsruhe Institute of Technology, Germany 1
Overview Identity-Based Encryption (IBE) Tight Security - Proof Idea Underlying IBE-Scheme by Chen and Wee Result: (almost) Tight Security for Multi- Instance, Multi-Ciphertext IBE 2
IBE-IND-CPA Security C* for id* succ.prob = 1 M0 or M1 ? 2 + 1 4
Multi-Instance, Multi-Ciphertext IBE-IND-CPA Security M0i,c or M1i,c? succ.prob = 1 2 + multi 5
Tight Security . . . Ni instances . . . Nc chall. ciphertexts Nu user secret keys security proof = reduction to hard problem (adv. = P) attack adv. 1 = Nu P (generic) attacks potentially easier attack adv. multi = Ni Nc 1 = Ni Nc Nu P 6
Tight Security Our goal: tight security i.e. multi P independent of Ni, Nc, Nu smaller keys, smaller groups recently: (somewhat) tightly secure multi- instance/multi-ciphertext PKE [HJ12, LJYP14] [Chen,Wee13]: somewhat tightly secure IBE 1 instance/1 ciphertext: 1 Nu P 7
Proof Idea of Chen and Wee Sequence of games depending on n-bit identity id = 1 n : normal i i depends on idi = i and position 8
Proof Idea of Chen and Wee Sequence of games depending on n-bit identity id = 1 n : start with real security game change all usks and C* normal 1* i* type i C*: id|i* = 1* i* normal C*: 1 i normal usk: type i usk: id|i = 1 i same type id|i* = id|i Decryption 9
Proof Idea of Chen and Wee Sequence of games depending on n-bit identity id = 1 n : start with real security game change all usks and C* normal type i C*: id|i* = 1* i* normal C*: normal usk: type i usk: id|i = 1 i same type id|i* = id|i Decryption 10
Proof Idea of Chen and Wee Sequence of games depending on n-bit identity id = 1 n : start with real security game change all usks and C* normal 1* i* type i C*: id|i* = 1* i* normal C*: 1 i normal usk: type i usk: id|i = 1 i same type id|i* = id|i same type id|i* id|i Decryption 11
Proof Idea of Chen and Wee Sequence of games depending on n-bit identity id = 1 n : start with real security game change all usks and C* normal 1* i* type i C*: id|i* = 1* i* normal C*: 1 i normal usk: type i usk: id|i = 1 i same type id|i* = id|i same type id|i* id|i Decryption 12
Proof Idea of Chen and Wee Sequence of games depending on n-bit identity id = 1 n : start with real security game change all usks and C* normal 1* i* type i C*: id|i* = 1* i* normal C*: 1 i i+1 type i+1 usk: normal usk: id|i+1 = 1 i+1 same type id|i* = id|i same type id|i* id|i different type id|i+1* = id|i+1 Decryption 13
Proof Idea of Chen and Wee Sequence of games depending on n-bit identity id = 1 n : start with real security game change all usks and C* normal type i C*: id|i* = 1* i* normal C*: i+1 type i+1 usk: normal usk: id|i+1 = 1 i+1 same type id|i* = id|i same type id|i* id|i different type id|i+1* = id|i+1 Decryption 14
Proof Idea of Chen and Wee Sequence of games depending on n-bit identity id = 1 n : start with real security game change all usks and C* normal 1* n* type n C*: id* = 1* n* normal C*: 1 n normal usk: type n usk: id = 1 n id* id for all usks 15
Proof Idea of Chen and Wee Sequence of games depending on n-bit identity id = 1 n : start with real security game change all usks and C* normal 1* n* type n C*: id* = 1* n* normal C*: 1 n normal usk: type n usk: id = 1 n id* id for all usks usks useless for decryption replace C* by random Adversary can only guess 16
Proof Idea of Chen and Wee Game hop: type i type i+1 Chall. C*: 1* i+1 i* test usk*: 1* i* usk: test C: 1 i+1 i 1 i Simulator embeds own challenge Simulator can test on its own Decryption: i+1 Game i i+1 = Decryption: Game i+1 i+1 17
Proof Idea of Chen and Wee Game hop: type i type i+1 Chall. C*: i+1 test usk*: usk: test C: i+1 Simulator embeds own challenge Simulator can test on its own Decryption: i+1 Game i i+1 = Decryption: Game i+1 i+1 18
Proof Idea of Chen and Wee Game hop: type i type i+1 Chall. C*: test usk*: i+1 usk: i+1 test C: Simulator embeds own challenge Simulator can test on its own Decryption: i+1 Game i i+1 = Decryption: Game i+1 i+1 19
Proof Idea of Chen and Wee Game hop: type i type i+1 Chall. C*: test usk*: i+1 usk: test C: i+1 Simulator embeds own challenge Simulator can test on its own Decryption: i+1 Game i i+1 = Decryption: Game i+1 i+1 20
Our Approach Problem for multi-instance, multi-ciphertext: Guessing of id*i+1: 1. for each instance loss = 2Ni 2. different chall. ciphertexts have different id-bits generation is not possible Our solution: distribute randomness into 2 compartments 21
Our Approach Solution: no guessing id*i+1 = 0 id*i+1 = 1 Simulator gets: no reaction no reaction i+1 i+1 C*: 1* 1* i* i* i+1 i+1 usk: i+1 1 1 i i i+1 1 1 i i i+1 i+1 type i = type i+1 type i type i+1 type i type i+1 type i = type i+1 22
Our Approach Solution: no guessing id*i+1 = 0 id*i+1 = 1 Simulator gets: no reaction no reaction i+1 i+1 C*: usk: 1 i i+1 1 i i+1 type i = type i+1 type i type i+1 type i type i+1 type i = type i+1 23
Conclusion no guessing (n) reductions: n = length of identity loss independent of the number of ciphertexts , instances and usk-queries first fully secure multi-instance, multi-ciphertext IBE with loss (n) for n-bit identities under a simple assumption 24