Presentation | 2005-07-22 Relations Among Notions of Security for Identity Based Encryption Schemes Peng Yang, Goichiro Hanaoka, Yang Cui, Rui Zhang, Attrapadung Nuttapong, Kanta Matsuura, Hideki Imai, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | We prove the equivalences among indistinguishability, semantic security and non-malleability under adaptive chosen identity and adaptive chosen ciphertext attacks. It relies on these equivalences that the researches on identity based encryption schemes are blossoming over past several years. We also describe formal definitions of notions of security for identity based encryption schemes. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Identity Based Encryption / Notions of Security / Equivalence / Chosen Identity Attack |
Paper # | ISEC2005-46 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2005/7/15(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Relations Among Notions of Security for Identity Based Encryption Schemes |
Sub Title (in English) | |
Keyword(1) | Identity Based Encryption |
Keyword(2) | Notions of Security |
Keyword(3) | Equivalence |
Keyword(4) | Chosen Identity Attack |
1st Author's Name | Peng Yang |
1st Author's Affiliation | Institute of Industrial Science, University of Tokyo() |
2nd Author's Name | Goichiro Hanaoka |
2nd Author's Affiliation | National Institute of Advanced Industrial Science and Technology (AIST) Research Center for Information Security:Institute of Industrial Science, University of Tokyo |
3rd Author's Name | Yang Cui |
3rd Author's Affiliation | Institute of Industrial Science, University of Tokyo |
4th Author's Name | Rui Zhang |
4th Author's Affiliation | Institute of Industrial Science, University of Tokyo |
5th Author's Name | Attrapadung Nuttapong |
5th Author's Affiliation | Institute of Industrial Science, University of Tokyo |
6th Author's Name | Kanta Matsuura |
6th Author's Affiliation | Institute of Industrial Science, University of Tokyo |
7th Author's Name | Hideki Imai |
7th Author's Affiliation | Institute of Industrial Science, University of Tokyo:National Institute of Advanced Industrial Science and Technology (AIST) Research Center for Information Security |
Date | 2005-07-22 |
Paper # | ISEC2005-46 |
Volume (vol) | vol.105 |
Number (no) | 194 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |