%PDF-1.5 % 1 0 obj << /S /GoTo /D (section.1) >> endobj 4 0 obj (Introduction) endobj 5 0 obj << /S /GoTo /D (subsection.1.1) >> endobj 8 0 obj (This work) endobj 9 0 obj << /S /GoTo /D (subsection.1.2) >> endobj 12 0 obj (Technical details) endobj 13 0 obj << /S /GoTo /D (subsection.1.3) >> endobj 16 0 obj (Other related work) endobj 17 0 obj << /S /GoTo /D (subsection.1.4) >> endobj 20 0 obj (Open problems) endobj 21 0 obj << /S /GoTo /D (section.2) >> endobj 24 0 obj (Definitions) endobj 25 0 obj << /S /GoTo /D (subsection.2.1) >> endobj 28 0 obj (Notation) endobj 29 0 obj << /S /GoTo /D (subsection.2.2) >> endobj 32 0 obj (Pairing groups and Matrix Diffie-Hellman Assumption) endobj 33 0 obj << /S /GoTo /D (section.3) >> endobj 36 0 obj (Message Authentication Codes) endobj 37 0 obj << /S /GoTo /D (subsection.3.1) >> endobj 40 0 obj (Affine MACs) endobj 41 0 obj << /S /GoTo /D (subsection.3.2) >> endobj 44 0 obj (An Affine MAC from the Naor-Reingold PRF) endobj 45 0 obj << /S /GoTo /D (subsection.3.3) >> endobj 48 0 obj (An Affine MAC from Hash Proof System) endobj 49 0 obj << /S /GoTo /D (section.4) >> endobj 52 0 obj (Identity-based Encryption from Affine MACs) endobj 53 0 obj << /S /GoTo /D (subsection.4.1) >> endobj 56 0 obj (Identity-based Key Encapsulation) endobj 57 0 obj << /S /GoTo /D (subsection.4.2) >> endobj 60 0 obj (The Transformation) endobj 61 0 obj << /S /GoTo /D (section.5) >> endobj 64 0 obj (Hierarchical Identity-based Encryption from Delegatable Affine MACs) endobj 65 0 obj << /S /GoTo /D (subsection.5.1) >> endobj 68 0 obj (Delegatable Affine MACs) endobj 69 0 obj << /S /GoTo /D (subsection.5.2) >> endobj 72 0 obj (Examples of Delegatable Affine MACs) endobj 73 0 obj << /S /GoTo /D (subsection.5.3) >> endobj 76 0 obj (Hierarchical Identity-Based Key Encapsulation) endobj 77 0 obj << /S /GoTo /D (subsection.5.4) >> endobj 80 0 obj (The Transformation) endobj 81 0 obj << /S /GoTo /D (subsection.5.5) >> endobj 84 0 obj (Anonymity-preserving Transformation) endobj 85 0 obj << /S /GoTo /D (appendix.A) >> endobj 88 0 obj (Security Proofs for the MACs) endobj 89 0 obj << /S /GoTo /D (subsection.A.1) >> endobj 92 0 obj (Security of Delegatable MACNR[Dk] \(Theorem 5.3\)) endobj 93 0 obj << /S /GoTo /D (subsection.A.2) >> endobj 96 0 obj (Security of Delegatable MACHPS[Dk] \(Theorem 5.4\)) endobj 97 0 obj << /S /GoTo /D (subsection.A.3) >> endobj 100 0 obj (Anonymity of delegatable MACHPS[Dk] \(Theorem 5.9\)) endobj 101 0 obj << /S /GoTo /D (appendix.B) >> endobj 104 0 obj (Security of the generic transformations) endobj 105 0 obj << /S /GoTo /D (subsection.B.1) >> endobj 108 0 obj (Security of HIBKEM transformation \(Theorem 5.7\)) endobj 109 0 obj << /S /GoTo /D (subsection.B.2) >> endobj 112 0 obj (Security of the Anonymous HIBKEM transformation \(Theorem 5.10\)) endobj 113 0 obj << /S /GoTo /D (appendix.C) >> endobj 116 0 obj (Identity-based Hash Proof System) endobj 117 0 obj << /S /GoTo /D (subsection.C.1) >> endobj 120 0 obj (Definitions) endobj 121 0 obj << /S /GoTo /D (subsection.C.2) >> endobj 124 0 obj (Construction) endobj 125 0 obj << /S /GoTo /D (subsection.C.3) >> endobj 128 0 obj (Security) endobj 129 0 obj << /S /GoTo /D (appendix.D) >> endobj 132 0 obj (Concrete Instantiation from SXDH) endobj 133 0 obj << /S /GoTo /D [134 0 R /Fit] >> endobj 151 0 obj << /Length 3531 /Filter /FlateDecode >> stream xڵZ[6~ϯ@̊"u[`I3m^2EH9udɕ$=7qڢC