Anonymous IBE from PEKS: A Generic Construction

Hyun Sook Rhee, Dong Hoon Lee

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Abdalla et al.[1, 6] proposed a transform of an anonymous IBE (A-IBE) scheme to a PEKS (Public key encryption with keyword search) scheme. Boneh et al. proposed a transform of a PEKS scheme to an A-IBE scheme for only one-bit message. A transform for constructing an A-IBE scheme for polynomially many-bit message by using a PEKS scheme has not been proposed yet. To construct a transform from any PEKS scheme to an A-IBE scheme for a polynomially many-bit message, we firstly define a multiple PEKS (mPEKS) scheme and show that a mPEKS scheme can be constructed from a PEKS scheme. We also prove that if a PEKS scheme is confidential, so is the resulting mPEKS scheme. We then provide a transform from a mPEKS scheme to an A-IBE scheme for a polynomially many-bit message.

    Original languageEnglish
    Title of host publicationInformation Security Applications - 22nd International Conference, WISA 2021, Revised Selected Papers
    EditorsHyoungshick Kim
    PublisherSpringer Science and Business Media Deutschland GmbH
    Pages105-118
    Number of pages14
    ISBN (Print)9783030894313
    DOIs
    Publication statusPublished - 2021
    Event22nd World Conference on Information Security Application, WISA 2021 - Jeju, Korea, Republic of
    Duration: 2021 Aug 112021 Aug 13

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume13009 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference22nd World Conference on Information Security Application, WISA 2021
    Country/TerritoryKorea, Republic of
    CityJeju
    Period21/8/1121/8/13

    Bibliographical note

    Publisher Copyright:
    © 2021, Springer Nature Switzerland AG.

    Keywords

    • Anonymous identity-based encryption
    • Public key encryption with keyword search
    • Searchable encryption

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'Anonymous IBE from PEKS: A Generic Construction'. Together they form a unique fingerprint.

    Cite this