Surrey researchers Sign in
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
Book chapter   Peer reviewed

CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model

Yu Chen, Liqun Chen and Zongyang Zhang
Information Security and Cryptology - ICISC 2011, pp.275-301
Lecture Notes in Computer Science, Springer Berlin Heidelberg
2012

Abstract

CBDH assumption CCA security identity based encryption standard model
In this paper, we propose several selective-identity chosen-ciphertext attack (IND-sID-CCA) secure identity based key encapsulation (IB-KEM) schemes that are provably secure under the computational bilinear Diffie-Hellman (CBDH) assumption in the standard model. Our schemes compare favorably to previous results in efficiency. With delicate modification, our schemes can be strengthened to be full-identity CCA secure easily.

Metrics

1 Record Views

Details

Usage Policy