Skip to main content
placeholder image

New Constructions of Fuzzy Identity-Based Encryption

Conference Paper


Abstract


  • In this paper we construct two new fuzzy identity-based en-

    cryption (IBE) schemes in the random oracle model. Not

    only do our schemes provide public parameters whose size

    is independent of the number of attributes in each identity

    (used as public key) but they also have useful structures

    which result in more eñcient key extraction and/or encryp-

    tion than the random oracle version of Sahai and Water's

    fuzzy IBE scheme, considered recently by Pirretti et al. We

    prove that the confidentiality of the proposed schemes is

    relative to the Bilinear Decisional Bilinear Diffe-Hellman

    problem.

Publication Date


  • 2007

Citation


  • Baek, J., Susilo, W. & Zhou, J. (2007). New Constructions of Fuzzy Identity-Based Encryption. In R. H. Deng & P. Samarati (Eds.), ACM Symposium on Information, Computer and Communications Security (pp. 368-370). New York: ACM.

Scopus Eid


  • 2-s2.0-34748851940

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/3097

Has Global Citation Frequency


Start Page


  • 368

End Page


  • 370

Place Of Publication


  • New York

Abstract


  • In this paper we construct two new fuzzy identity-based en-

    cryption (IBE) schemes in the random oracle model. Not

    only do our schemes provide public parameters whose size

    is independent of the number of attributes in each identity

    (used as public key) but they also have useful structures

    which result in more eñcient key extraction and/or encryp-

    tion than the random oracle version of Sahai and Water's

    fuzzy IBE scheme, considered recently by Pirretti et al. We

    prove that the confidentiality of the proposed schemes is

    relative to the Bilinear Decisional Bilinear Diffe-Hellman

    problem.

Publication Date


  • 2007

Citation


  • Baek, J., Susilo, W. & Zhou, J. (2007). New Constructions of Fuzzy Identity-Based Encryption. In R. H. Deng & P. Samarati (Eds.), ACM Symposium on Information, Computer and Communications Security (pp. 368-370). New York: ACM.

Scopus Eid


  • 2-s2.0-34748851940

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/3097

Has Global Citation Frequency


Start Page


  • 368

End Page


  • 370

Place Of Publication


  • New York