Show simple item record

dc.contributor.authorGoldwasser, Shafi
dc.contributor.authorLewko, Allison
dc.contributor.authorWilson, David A.
dc.date.accessioned2014-05-05T19:24:01Z
dc.date.available2014-05-05T19:24:01Z
dc.date.issued2012-03
dc.identifier.isbn978-3-642-28913-2
dc.identifier.isbn978-3-642-28914-9
dc.identifier.issn0302-9743
dc.identifier.issn1611-3349
dc.identifier.urihttp://hdl.handle.net/1721.1/86419
dc.description.abstractIn this work, we show how to construct IBE schemes that are secure against a bounded number of collusions, starting with underlying PKE schemes which possess linear homomorphisms over their keys. In particular, this enables us to exhibit a new (bounded-collusion) IBE construction based on the quadratic residuosity assumption, without any need to assume the existence of random oracles. The new IBE’s public parameters are of size O(tλlogI) where I is the total number of identities which can be supported by the system, t is the number of collusions which the system is secure against, and λ is a security parameter. While the number of collusions is bounded, we note that an exponential number of total identities can be supported. More generally, we give a transformation that takes any PKE satisfying Linear Key Homomorphism, Identity Map Compatibility, and the Linear Hash Proof Property and translates it into an IBE secure against bounded collusions. We demonstrate that these properties are more general than our quadratic residuosity-based scheme by showing how a simple PKE based on the DDH assumption also satisfies these properties.en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (NSF CCF-0729011)en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (NSF CCF-1018064)en_US
dc.description.sponsorshipUnited States. Defense Advanced Research Projects Agency (DARPA FA8750-11-2-0225)en_US
dc.language.isoen_US
dc.publisherSpringer-Verlagen_US
dc.relation.isversionofhttp://dx.doi.org/10.1007/978-3-642-28914-9_32en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceMIT web domainen_US
dc.titleBounded-Collusion IBE from Key Homomorphismen_US
dc.typeArticleen_US
dc.identifier.citationGoldwasser, Shafi, Allison Lewko, and David A. Wilson. “Bounded-Collusion IBE from Key Homomorphism.” Theory of Cryptography (2012): 564–581.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorGoldwasser, Shafien_US
dc.contributor.mitauthorWilson, David A.en_US
dc.relation.journalTheory of Cryptographyen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dspace.orderedauthorsGoldwasser, Shafi; Lewko, Allison; Wilson, David A.en_US
dc.identifier.orcidhttps://orcid.org/0000-0003-4728-1535
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record