eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.

Paper 2013/002

Generalized (Identity-Based) Hash Proof System and Its Applications

Yu Chen, Zongyang Zhang, Dongdai Lin, and Zhenfu Cao

Abstract

In this work, we generalize the paradigm of hash proof system (HPS) proposed by Cramer and Shoup [CS02]. In the central of our generalization, we lift subset membership problem to distribution distinguish problem. Our generalized HPS clarifies and encompass all the known public-key encryption (PKE) schemes that essentially implement the idea of hash proof system. Moreover, besides existing smoothness property, we introduce an additional property named anonymity for HPS. As a natural application, we consider anonymity for PKE in the presence of key-leakage, and provide a generic construction of leakage-resilient anonymous PKE from anonymous HPS. We then extend our generalization to the identity-based setting. Concretely, we generalize the paradigm of identity-based hash proof system (IB-HPS) proposed by Boneh et al. [BGH07] and Alwen et al. [ADN+ 10], and introduce anonymity for it. As an interesting application of anonymous IB-HPS, we consider security for public-key encryption with keyword search (PEKS) in the presence of token-leakage, and provide a generic construction of leakage-resilient secure PEKS from leakage-resilient anonymous IBE, which in turn is based on anonymous IB-HPS.

Note: Compared to the conference version, this version presents the generalization of (IB)-HPS, and proposes the notion of leakage-resilient PEKS with a generic construction.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. An extended abstract of this paper has been accepted by Provsec 2012 entitled "Anonymous Identity-Based Hash Proof System and Its Applications". This is the full version with many newly added materials.
Keywords
(identity-based) hash proof systemleakage-resilienceanonymitypublic-key encryption with keyword search
Contact author(s)
cycosmic @ gmail com
History
2013-01-05: last of 2 revisions
2013-01-04: received
See all versions
Short URL
https://ia.cr/2013/002
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2013/002,
      author = {Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao},
      title = {Generalized (Identity-Based) Hash Proof System and Its Applications},
      howpublished = {Cryptology ePrint Archive, Paper 2013/002},
      year = {2013},
      note = {\url{https://eprint.iacr.org/2013/002}},
      url = {https://eprint.iacr.org/2013/002}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.