Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition

Author(s):  
Goichiro Hanaoka ◽  
Misaki Komatsu ◽  
Kazuma Ohara ◽  
Yusuke Sakai ◽  
Shota Yamada
2013 ◽  
Vol 2013 ◽  
pp. 1-9
Author(s):  
Song Luo ◽  
Ning Hu

Anonymity of identity-based encryption (IBE) means that given a ciphertext, one cannot distinguish the target identity from a random identity. In this paper, we thoroughly discuss the anonymity of IBE systems. We found that the current definition of anonymity is obscure to describe some IBE systems, such as Gentry IBE system. Furthermore, current definition cannot express the degree of anonymity. So we divide the degree of anonymity into weak anonymity and strong anonymity based on indistinguishability between different games. For weakly anonymous IBE systems, the target identity in a ciphertext cannot be distinguished from a random identity. For strongly anonymous IBE systems, the whole ciphertext cannot be distinguished from a random tuple. We also discuss the type of anonymity and divide it into two types. Type 1 means that a random tuple can be seen as a valid ciphertext, while type 2 cannot. Based on our new definitions, we show that three famous IBE systems, Gentry IBE system, Boyen-Waters IBE system, and Lewko IBE system, have strong but different types of anonymity.


2013 ◽  
Vol 321-324 ◽  
pp. 2665-2668
Author(s):  
Peng Tao Liu

Symmetric key fuzzy Identity-Based Encryption (IBE) is a special type of IBE in secret key model. In this paper we extend the notion to the case of fuzzy Identity-Based Encryption, and give a formal definition of symmetric key fuzzy IBE and its security requirements. Moreover, we propose a construction of symmetric key fuzzy IBE based on the public key fuzzy IBE of Sahai and Waters, and prove its security.


2014 ◽  
Vol 513-517 ◽  
pp. 1971-1974 ◽  
Author(s):  
Hai Lin Xu ◽  
Yang Lu

Certificate-based encryption is a new paradigm which was introduced by Gentry to address the complex public key revocation problem in traditional public key cryptosystems. It represents an interesting and potentially useful balance between traditional public-key encryption and identity-based encryption. In this paper, we introduce the notion of hierarchical certificate-based encryption that preserves the advantages of certificate-based encryption such as implicit certificate and key-escrow free while inheriting the properties of hierarchical identity-based encryption. We formalize the definition of hierarchical certificate-based encryption and also propose a concrete hierarchical certificate-based encryption scheme that is chosen-ciphertext secure under the hardness of bilinear Diffie-Hellman problem in the random oracle model.


Author(s):  
Jae Hong SEO ◽  
Tetsutaro KOBAYASHI ◽  
Miyako OHKUBO ◽  
Koutarou SUZUKI

2017 ◽  
Vol 1 (1) ◽  
pp. 15-31
Author(s):  
Francisco Xavier Morales

The problem of identity is an issue of contemporary society that is not only expressed in daily life concerns but also in discourses of politics and social movements. Nevertheless, the I and the needs of self-fulfillment usually are taken for granted. This paper offers thoughts regarding individual identity based on Niklas Luhmann’s systems theory. From this perspective, identity is not observed as a thing or as a subject, but rather as a “selfillusion” of a system of consciousness, which differentiates itself from the world, event after event, in a contingent way. As concerns the definition  of contents of self-identity, the structures of social systems define who is a person, how he or she should act, and how much esteem he or she should receive. These structures are adopted by consciousness as its own identity structures; however, some social contexts are more relevant for self-identity construction than others. Moral communication increases the probability that structure appropriation takes place, since the emotional element of identity is linked to the esteem/misesteem received by the individual from the interactions in which he or she participates.


2003 ◽  
Vol 38 (4) ◽  
pp. 47-56 ◽  
Author(s):  
Lei Luo ◽  
Ming-Yuan Zhu ◽  
Qing-Li Zhang

1982 ◽  
Vol 17 (6) ◽  
pp. 327-333
Author(s):  
Terrence W. Pratt ◽  
George D. Maydwell

Sign in / Sign up

Export Citation Format

Share Document