Generalized Galbraith’s Test: Characterization and Applications to Anonymous IBE Schemes
Abstract
:1. Introduction
Structure of the Paper
2. Preliminaries
2.1. Notations
2.2. Identity-Based Encryption
- Setup: The challenger C generates the public parameters and sends them to adversary A while keeping the master key to himself.
- Queries: The adversary issues a finite number of adaptive queries. A query can be one of the following types:
- Private key query. When A requests a query for an identity, the challenger runs the KeyGen algorithm and returns the resulting private key to A.
- Encryption query. Adversary A can issue only one query of this type. He sends C two pairs and consisting of two equal-length plaintexts and and two identities and . The challenger flips a coin and encrypts using . The resulting ciphertext c is sent to the adversary. The following restrictions are in place: private key queries for and must never be issued.
- Guess: In this phase, the adversary outputs a guess . He wins the game if .
3. Generalized Galbraith’s Test
- 1.
- If then , else .
- 2.
- If then , else .
- 3.
- If then , else .
- 1.
- If then , else .
- 2.
- If then , else .
4. Clear et al. IBE Scheme
4.1. Scheme Description
- Setup: Given a security parameter , generate two primes and compute their product . The public parameters are and the master secret key is , where such that , and are two cryptographic hash functions. Note that must also satisfy the property that for any identity and , it holds that
- KeyGen: Let . If , then compute . Otherwise, compute . The private key is r.
- Enc: On inputting , an identity and a message , compute the hash value and randomly choose two polynomials of degree 1 from such that , where and . Furthermore, calculateReturn the ciphertext .
- Dec: On input , a secret key r and a ciphertext , compute
- Anon: Given the public parameters , an identity and a ciphertext ), compute and . Furthermore, generate two random bits and calculateReturn the anonymized ciphertext .
- DeAnon: On input , a secret key r, and a ciphertext , compute , and
4.2. Previous Analysis
4.3. New Analysis
- 1.
- If then , else .
- 2.
- If then , else .
- 1.
- If , then , else if .
- 2.
- If , then , else if .
5. Zhao et al. IBE Scheme
5.1. Scheme Description
- Setup: Given a security parameter , generate two primes and compute their product . Randomly generate two integers such that and . The public parameters are , where is a cryptographic hash function. The master secret key is .
- KeyGen: Let . If , then compute . Otherwise, compute . The private key is r.
- Enc: On inputting , an identity and a message , compute the hash value and randomly choose two polynomials of degree 1 from . Furthermore, calculateReturn the ciphertext .
- Dec: On input , a secret key r and a ciphertext , compute
5.2. Previous Work
5.3. New Analysis
- 1.
- If then ; else
- 2.
- If then , else
- 1.
- If then , else if .
- 2.
- If then , else if .
6. Conclusions
Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Conflicts of Interest
References
- Shamir, A. Identity-Based Cryptosystems and Signature Schemes. In CRYPTO 1984: Advances in Cryptology; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 1985; Volume 196, pp. 47–53. [Google Scholar]
- Boneh, D.; Franklin, M.K. Identity-Based Encryption from the Weil Pairing. In CRYPTO 2001: Advances in Cryptology; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2001; Volume 2139, pp. 213–229. [Google Scholar]
- Cocks, C. An Identity Based Encryption Scheme Based on Quadratic Residues. In Cryptography and Coding 2001: Cryptography and Coding; Lecture Notes in Computer Science; IMACC 2001; Springer: Berlin/Heidelberg, Germany, 2001; Volume 2260, pp. 360–363. [Google Scholar]
- Bellare, M.; Boldyreva, A.; Desai, A.; Pointcheval, D. Key-Privacy in Public-Key Encryption. In ASIACRYPT 2001: Advances in Cryptology; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2001; Volume 2248, pp. 566–582. [Google Scholar]
- Ateniese, G.; Gasti, P. Universally Anonymous IBE Based on the Quadratic Residuosity Assumption. In CT-RSA 2009: Topics in Cryptology; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2009; Volume 5473, pp. 32–47. [Google Scholar]
- Ţiplea, F.L.; Iftene, S.; Teşeleanu, G.; Nica, A.M. On the distribution of quadratic residues and non-residues modulo composite integers and applications to cryptography. Appl. Math. Comput. 2020, 372, 124993. [Google Scholar] [CrossRef]
- Clear, M.; Tewari, H.; McGoldrick, C. Anonymous IBE from Quadratic Residuosity with Improved Performance. In AFRICACRYPT 2014: Progress in Cryptology; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2014; Volume 8469, pp. 377–397. [Google Scholar]
- Joye, M. Identity-Based Cryptosystems and Quadratic Residuosity. In Public-Key Cryptography–PKC 2016; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2016; Volume 9614, pp. 225–254. [Google Scholar]
- Boneh, D.; Gentry, C.; Hamburg, M. Space-efficient Identity Based Encryption Without Pairings. In Proceedings of the FOCS 2007, IEEE Computer Society, Providence, RI, USA, 20–23 October 2007; pp. 647–657. [Google Scholar]
- Zhao, X.; Cao, Z.; Dong, X.; Zheng, J. Anonymous IBE from Quadratic Residuosity with Fast Encryption. In ISC 2020: Information Security; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2020; Volume 12472, pp. 3–19. [Google Scholar]
- Schipor, G.A. On the Anonymization of Cocks IBE Scheme. In BalkanCryptSec 2014: Cryptography and Information Security in the Balkans; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2014; Volume 9024, pp. 194–202. [Google Scholar]
- Clear, M.; Hughes, A.; Tewari, H. Homomorphic Encryption with Access Policies: Characterization and New Constructions. In AFRICACRYPT 2013: Progress in Cryptology; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2013; Volume 7918, pp. 61–87. [Google Scholar]
- Nica, A.M.; Țiplea, F.L. On Anonymization of Cocks’ Identity-based Encryption Scheme. Comput. Sci. J. Mold. 2019, 81, 283–298. [Google Scholar]
- Boneh, D.; Crescenzo, G.D.; Ostrovsky, R.; Persiano, G. Public Key Encryption with Keyword Search. In EUROCRYPT 2004: Advances in Cryptology; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2004; Volume 3027, pp. 506–522. [Google Scholar]
- Zhao, X.; Cao, Z.; Dong, X.; Shao, J. Extended Galbraith’s Test on the Anonymity of IBE Schemes from Higher Residuosity. Des. Codes Cryptogr. 2021, 89, 241–253. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Cotan, P.; Teşeleanu, G. Generalized Galbraith’s Test: Characterization and Applications to Anonymous IBE Schemes. Mathematics 2021, 9, 1184. https://doi.org/10.3390/math9111184
Cotan P, Teşeleanu G. Generalized Galbraith’s Test: Characterization and Applications to Anonymous IBE Schemes. Mathematics. 2021; 9(11):1184. https://doi.org/10.3390/math9111184
Chicago/Turabian StyleCotan, Paul, and George Teşeleanu. 2021. "Generalized Galbraith’s Test: Characterization and Applications to Anonymous IBE Schemes" Mathematics 9, no. 11: 1184. https://doi.org/10.3390/math9111184
APA StyleCotan, P., & Teşeleanu, G. (2021). Generalized Galbraith’s Test: Characterization and Applications to Anonymous IBE Schemes. Mathematics, 9(11), 1184. https://doi.org/10.3390/math9111184