Complete robustness in identity-based encryption

Hui Cui, Yi Mu, Man Ho Allen Au

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

1 Citation (Scopus)


Complete robustness (CROB) was proposed to guarantee that for a public key encryption scheme, decryption attempts will fail with high probability if the wrong decryption key is used to decrypt a ciphertext, even if the keys are maliciously generated by the adversary. In this paper, we extend the notion of complete robustness to the identity-based setting. We firstly formalize the CROB for identity-based encryption, and present a generic construction achieving CROB from an arbitrary identity-based encryption scheme. After that, we investigate whether there exist some kind of relations between CROB and relatedkey attack (RKA) security for the case of identity-based encryption. We conclude that these two notions (CROB and RKA security) are separable for identity-based encryption, but with a slight modification to our generic construction, an identity-based encryption scheme offering complete robustness with security against related-key attacks can be constructed from any identity-based encryption scheme.
Original languageEnglish
Title of host publicationProvable Security - 8th International Conference, ProvSec 2014, Proceedings
PublisherSpringer Verlag
Number of pages8
ISBN (Electronic)9783319124742
Publication statusPublished - 1 Jan 2014
Externally publishedYes
Event21st International Conference on Neural Information Processing, ICONIP 2014 - Kuching, Malaysia
Duration: 3 Nov 20146 Nov 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference21st International Conference on Neural Information Processing, ICONIP 2014


  • CROB
  • Identity-based encryption
  • RKA security

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Complete robustness in identity-based encryption'. Together they form a unique fingerprint.

Cite this