Authors: Hao Wang; Zhihua Zheng; Bo Yang
Addresses: School of Information Science and Engineering, Shandong Normal University, Jinan 250014, Shandong, China; Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology, Jinan 250014, Shandong, China; Shandong Provincial Key Laboratory of Software Engineering, Jinan 250101, Shandong, China ' School of Information Science and Engineering, Shandong Normal University, Jinan 250014, Shandong, China ' Department of Electronic Engineering, Yantai Vocational College, Yantai 264670, Shandong, China
Abstract: Identity-based encryption (IBE) is an important primitive of identity-based cryptography. As such, it is a type of public-key encryption in which the public key of a user is some unique information about the identity of the user (e.g., a user's e-mail address). As a special form of IBE, identity-based key encapsulation mechanism (IB-KEM) can be used to create a random session key for encrypting messages. Any IB-KEM can be updated to a full IBE scheme by adding a symmetric encryption scheme with appropriate security properties. Currently, IB-KEM is a fundamental primitive of cryptography, and can be used to protect information system security, network security, cloud security, etc. In this paper, we construct a new IB-KEM in a generic levelled multilinear map setting and prove its security under multilinear decisional Diffie-Hellman assumption in the selective-ID model. Then, we make our IB-KEM translated to the GGH framework, which is proposed by Garg et al. (2013a). This framework defines an approximate version of a multilinear group family from ideal lattices. Finally, as an application of our new scheme, we introduce how to achieve secure transmission in the hierarchical architecture for cloud computing (HACC).
Keywords: identity-based encryption; IBE; multilinear maps; GGH framework; cloud computing; key encapsulation; cloud computing; cloud security; cryptography; public key encryption.
International Journal of High Performance Computing and Networking, 2015 Vol.8 No.2, pp.124 - 134
Available online: 23 Jun 2015 *Full-text access for editors Access for subscribers Purchase this article Comment on this article