On the Anonymity of Identity-Based Encryption

Anonymity of identity-based encryption (IBE) means that given a ciphertext, one cannot distinguish the target identity from a random identity. In this paper, we thoroughly discuss the anonymity of IBE systems. We found that the current definition of anonymity is obscure to describe some IBE systems,...

Full description

Saved in:
Bibliographic Details
Main Authors: Song Luo, Ning Hu
Format: Article
Language:English
Published: Wiley 2013-01-01
Series:Journal of Applied Mathematics
Online Access:http://dx.doi.org/10.1155/2013/217480
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850173973875130368
author Song Luo
Ning Hu
author_facet Song Luo
Ning Hu
author_sort Song Luo
collection DOAJ
description Anonymity of identity-based encryption (IBE) means that given a ciphertext, one cannot distinguish the target identity from a random identity. In this paper, we thoroughly discuss the anonymity of IBE systems. We found that the current definition of anonymity is obscure to describe some IBE systems, such as Gentry IBE system. Furthermore, current definition cannot express the degree of anonymity. So we divide the degree of anonymity into weak anonymity and strong anonymity based on indistinguishability between different games. For weakly anonymous IBE systems, the target identity in a ciphertext cannot be distinguished from a random identity. For strongly anonymous IBE systems, the whole ciphertext cannot be distinguished from a random tuple. We also discuss the type of anonymity and divide it into two types. Type 1 means that a random tuple can be seen as a valid ciphertext, while type 2 cannot. Based on our new definitions, we show that three famous IBE systems, Gentry IBE system, Boyen-Waters IBE system, and Lewko IBE system, have strong but different types of anonymity.
format Article
id doaj-art-d2b1e2e835c54c61af327969e816c8b5
institution OA Journals
issn 1110-757X
1687-0042
language English
publishDate 2013-01-01
publisher Wiley
record_format Article
series Journal of Applied Mathematics
spelling doaj-art-d2b1e2e835c54c61af327969e816c8b52025-08-20T02:19:44ZengWileyJournal of Applied Mathematics1110-757X1687-00422013-01-01201310.1155/2013/217480217480On the Anonymity of Identity-Based EncryptionSong Luo0Ning Hu1College of Computer Science and Engineering, Chongqing University of Technology, Chongqing 400054, ChinaKai Feng Culture And Arts College, Kaifeng 475000, ChinaAnonymity of identity-based encryption (IBE) means that given a ciphertext, one cannot distinguish the target identity from a random identity. In this paper, we thoroughly discuss the anonymity of IBE systems. We found that the current definition of anonymity is obscure to describe some IBE systems, such as Gentry IBE system. Furthermore, current definition cannot express the degree of anonymity. So we divide the degree of anonymity into weak anonymity and strong anonymity based on indistinguishability between different games. For weakly anonymous IBE systems, the target identity in a ciphertext cannot be distinguished from a random identity. For strongly anonymous IBE systems, the whole ciphertext cannot be distinguished from a random tuple. We also discuss the type of anonymity and divide it into two types. Type 1 means that a random tuple can be seen as a valid ciphertext, while type 2 cannot. Based on our new definitions, we show that three famous IBE systems, Gentry IBE system, Boyen-Waters IBE system, and Lewko IBE system, have strong but different types of anonymity.http://dx.doi.org/10.1155/2013/217480
spellingShingle Song Luo
Ning Hu
On the Anonymity of Identity-Based Encryption
Journal of Applied Mathematics
title On the Anonymity of Identity-Based Encryption
title_full On the Anonymity of Identity-Based Encryption
title_fullStr On the Anonymity of Identity-Based Encryption
title_full_unstemmed On the Anonymity of Identity-Based Encryption
title_short On the Anonymity of Identity-Based Encryption
title_sort on the anonymity of identity based encryption
url http://dx.doi.org/10.1155/2013/217480
work_keys_str_mv AT songluo ontheanonymityofidentitybasedencryption
AT ninghu ontheanonymityofidentitybasedencryption