New assumptions on isogenous pairing groups with applications to attribute-based encryption

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

We introduce new isogeny-related assumptions called Isog-DDH and Isog-DBDH assumptions. By using the assumptions, we reinforce security of several existing (hierarchical) identity-/attribute-based encryption (HIBE/ABE) schemes. While the existing schemes are proven from the standard DBDH assumption, our reinforced secure ones have two incomparable security proofs: one is proven from the DBDH as well and another is proven from the Isog-DDH assumption which is incomparable with DBDH. As a result, if either DBDH or Isog-DDH assumption holds, the proposed HIBE/ABE schemes are secure. For obtaining our (H)IBE secure in the standard model, we assign a unique (product) group called ID-group to each (H)ID, and introduce a new proof technique, i.e., ID-group partitioning by using isogenies as trapdoors.

Original languageEnglish
Title of host publicationInformation Security and Cryptology – ICISC 2018 - 21st International Conference, Revised Selected Papers
EditorsKwangsu Lee
PublisherSpringer Verlag
Pages3-19
Number of pages17
ISBN (Print)9783030121457
DOIs
Publication statusPublished - 2019
Event21st International Conference on Information Security and Cryptology, ICISC 2018 - Seoul, Korea, Republic of
Duration: 2018 Nov 282018 Nov 30

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11396 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other21st International Conference on Information Security and Cryptology, ICISC 2018
CountryKorea, Republic of
CitySeoul
Period18/11/2818/11/30

Keywords

  • Attribute-based encryption
  • Identity-based encryption
  • Isogenous pairing groups
  • Security reinforcement

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'New assumptions on isogenous pairing groups with applications to attribute-based encryption'. Together they form a unique fingerprint.

Cite this