An efficient IBE scheme with tight security reduction in the random oracle model

Jong Hwan Park, Dong Hoon Lee

Research output: Contribution to journalArticlepeer-review

13 Citations (Scopus)


We present a new practical identity-based encryption (IBE) system that can be another candidate for standard IBE techniques. Our construction is based on a new framework for realizing an IBE trapdoor from pairing-based groups, which is motivated from the ‘two equation’ revocation technique suggested by Lewko et al. (IEEE Symposium on Security and Privacy, 2010). The new framework enables our IBE system to achieve a tight security reduction to the Decisional Bilinear Diffie–Hellman assumption in the random oracle model. Due to its the tightness, our system can take as input the shorter size of security parameters than the previous practical BF, SK, and (Formula presented.) systems, which provides better efficiency to our system in terms of computational cost.

Original languageEnglish
Pages (from-to)63-85
Number of pages23
JournalDesigns, Codes, and Cryptography
Issue number1
Publication statusPublished - 2016 Apr 1

Bibliographical note

Funding Information:
The authors would like to thank the reviewers for their helpful comments and suggestions for this paper. Jong Hwan Park was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (NRF-2013R1A1A2009524). Dong Hoon Lee was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MEST) (No. 2010-0029121).

Publisher Copyright:
© 2015, Springer Science+Business Media New York.


  • Bilinear maps
  • Identity based encryption
  • Tight reduction

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science Applications
  • Discrete Mathematics and Combinatorics
  • Applied Mathematics


Dive into the research topics of 'An efficient IBE scheme with tight security reduction in the random oracle model'. Together they form a unique fingerprint.

Cite this