Secure Hierarchical Identity Based Encryption Scheme in the Standard Model

  • Authors:
  • Yanli Ren;Dawu Gu

  • Affiliations:
  • Dept. of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China 200240;Dept. of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China 200240

  • Venue:
  • INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

An identity based cryptosystem is a public key cryptosystem where the public key can be represented as an arbitrary string. Hierarchical identity based cryptography is a generalization of identity based encryption that mirrors an organizational hierarchy. It allows a root private key generator to distribute the workload by delegating private key generation and identity authentication to lower-level private key generators. Most of hierarchical identity based encryption schemes are provably secure in the random oracles or weak models without random oracles such as selective-ID model. Currently, there is no hierarchical identity based encryption scheme that is fully CCA2 secure in the standard model, with short public parameters and a tight reduction. In this paper, we first propose a hierarchical identity based encryption scheme that is fully secure in the standard model. And it achieves IND-ID-CCA2 security based on the decision q-TBDHE problem. The ciphertext size is independent of the level of the hierarchy. Moreover, our scheme has short public parameters, high efficiency and a tight reduction simultaneously.