Abstract
This paper discusses the security of identity-based cryptography with multiple private-key generators (mPKG-IBC). Most mPKG-IBC schemes and protocols are statically secure where private-key generators (PKGs) cannot control a binding between a party and its PKG. We propose adaptive security notions for identity-based key encapsulation mechanism with multiple private-key generators, identity-based signature with multiple private-key generators, and identity-based authenticated key exchange with multiple private-key generators, respectively. In additions, we provide their generic constructions of those from identity-based key encapsulation mechanism, identity-based signature, and identity-based authenticated key exchange which are secure in a single PKG model, respectively.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586–615 (2003)
Chen, L., Kudla, C.: Identity based authenticated key agreement protocols from pairings. In: 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), pp. 219–233. IEEE Computer Society (2003). http://eprint.iacr.org/2002/184
Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987). https://doi.org/10.1007/3-540-47721-7_12
Fujioka, A.: One-round exposure-resilient identity-based authenticated key agreement with multiple private key generators. In: Phan, R.C.-W., Yung, M. (eds.) Mycrypt 2016. LNCS, vol. 10311, pp. 436–460. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-61273-7_21
Fujioka, A.: Adaptive security in identity-based authenticated key agreement with multiple private key generators. In: Obana, S., Chida, K. (eds.) IWSEC 2017. LNCS, vol. 10418, pp. 192–211. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-64200-0_12
Fujioka, A., Suzuki, K., Xagawa, K., Yoneyama, K.: Strongly secure authenticated key exchange from factoring, codes, and lattices. Des. Codes Cryptogr. 76(3), 469–504 (2015). A preliminary version is appeared in PKC 2012 (2012)
Huang, H., Cao, Z.: An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem. In: Li, W., Susilo, W., Tupakula, U.K., Safavi-Naini, R., Varadharajan, V. (eds.) ASIACCS 2009, pp. 333–342. ACM, New York (2009)
Karthikeyan, H., Chakraborty, S., Singh, K., Rangan, C.P.: An efficient multiple PKG compatible identity based key agreement for vehicular networks. IACR Cryptology ePrint Archive 2015, 1012 (2015). A preliminary version was presented as “An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks” in Inscrypt 2015
Li, F., Shirase, M., Takagi, T.: Efficient multi-PKG ID-based signcryption for ad hoc networks. In: Yung, M., Liu, P., Lin, D. (eds.) Inscrypt 2008. LNCS, vol. 5487, pp. 289–304. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01440-6_23
Qin, L., Cao, Z., Dong, X.: Multi-receiver identity-based encryption in multiple PKG environment. In: Proceedings of the Global Communications Conference, GLOBECOM 2008, pp. 1862–1866. IEEE (2008)
Smart, N.P.: An identity based authenticated key agreement protocol based on the Weil pairing. IACR Cryptology ePrint Archive 2001, 111 (2001). http://eprint.iacr.org/2001/111
Wang, S., Cao, Z., Xie, Q., Liu, W.: Practical identity-based encryption in multiple private key generator (PKG) environments. Secur. Commun. Netw. 8(1), 43–50 (2015)
Xu, Z., Ma, R., Liu, S., He, W.: EISM: an efficient ID-based signcryption scheme for multi-PKG multihop wireless networks of mobile hosts. Ad Hoc Sens. Wirel. Netw. 11(1–2), 93–110 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Fujioka, A., Yoneyama, K. (2018). Single Private-Key Generator Security Implies Multiple Private-Key Generators Security. In: Baek, J., Susilo, W., Kim, J. (eds) Provable Security. ProvSec 2018. Lecture Notes in Computer Science(), vol 11192. Springer, Cham. https://doi.org/10.1007/978-3-030-01446-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-01446-9_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-01445-2
Online ISBN: 978-3-030-01446-9
eBook Packages: Computer ScienceComputer Science (R0)