Presentation 2005-07-22
Relations Among Notions of Security for Identity Based Encryption Schemes
Peng Yang, Goichiro Hanaoka, Yang Cui, Rui Zhang, Attrapadung Nuttapong, Kanta Matsuura, Hideki Imai,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) We prove the equivalences among indistinguishability, semantic security and non-malleability under adaptive chosen identity and adaptive chosen ciphertext attacks. It relies on these equivalences that the researches on identity based encryption schemes are blossoming over past several years. We also describe formal definitions of notions of security for identity based encryption schemes.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Identity Based Encryption / Notions of Security / Equivalence / Chosen Identity Attack
Paper # ISEC2005-46
Date of Issue

Conference Information
Committee ISEC
Conference Date 2005/7/15(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Relations Among Notions of Security for Identity Based Encryption Schemes
Sub Title (in English)
Keyword(1) Identity Based Encryption
Keyword(2) Notions of Security
Keyword(3) Equivalence
Keyword(4) Chosen Identity Attack
1st Author's Name Peng Yang
1st Author's Affiliation Institute of Industrial Science, University of Tokyo()
2nd Author's Name Goichiro Hanaoka
2nd Author's Affiliation National Institute of Advanced Industrial Science and Technology (AIST) Research Center for Information Security:Institute of Industrial Science, University of Tokyo
3rd Author's Name Yang Cui
3rd Author's Affiliation Institute of Industrial Science, University of Tokyo
4th Author's Name Rui Zhang
4th Author's Affiliation Institute of Industrial Science, University of Tokyo
5th Author's Name Attrapadung Nuttapong
5th Author's Affiliation Institute of Industrial Science, University of Tokyo
6th Author's Name Kanta Matsuura
6th Author's Affiliation Institute of Industrial Science, University of Tokyo
7th Author's Name Hideki Imai
7th Author's Affiliation Institute of Industrial Science, University of Tokyo:National Institute of Advanced Industrial Science and Technology (AIST) Research Center for Information Security
Date 2005-07-22
Paper # ISEC2005-46
Volume (vol) vol.105
Number (no) 194
Page pp.pp.-
#Pages 8
Date of Issue