Hierarchical identity-based encryption without key delegation in decryption

被引:0
|
作者
Luo, Song [1 ]
Chen, Zhong [2 ,3 ]
机构
[1] Chongqing Univ Technol, Coll Comp Sci & Engn, Chongqing 400054, Peoples R China
[2] Peking Univ, Sch Elect Engn & Comp Sci, Inst Software, Beijing 100871, Peoples R China
[3] Peking Univ, Minist Educ, Key Lab High Confidence Software Technol, Beijing 100871, Peoples R China
关键词
hierarchical identity-based encryption; key delegation; decryption; standard model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hierarchical Identity-Based Encryption (HIBE) is a generalisation of Identity- Based Encryption (IBE) which mirrors an organisational hierarchy. However, when the user decrypts a ciphertext encrypted to a hierarchical identity, he/she should know the exact hierarchical identity in order to run the delegate algorithm to get the secret key corresponding to the target hierarchical identity if the hierarchical identity linked with his/her key is a prefix of the target hierarchical identity. In this paper, we consider a new concept called HIBE without key delegation in decryption. In such HIBE systems, the user can decrypt the ciphertext directly without running the delegate algorithm even if his hierarchical identity is only a prefix of the target hierarchical identity. We present two HIBE systems, which are proven secure in the standard model under the decision BDH and l-BDHE assumptions, respectively. Both systems have the same decryption efficiency in pairing, compared with BB1-HIBE system and BBG-HIBE system, respectively.
引用
收藏
页码:71 / 79
页数:9
相关论文
共 50 条
  • [1] Anonymous hierarchical identity-based encryption without key delegation in decryption
    Luo, Song
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) : 306 - 317
  • [2] Generalized key delegation for hierarchical identity-based encryption
    Abdalla, Michel
    Kiltz, Eike
    Neven, Gregory
    [J]. COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 139 - 154
  • [3] Generalised key delegation for hierarchical identity-based encryption
    Abdalla, M.
    Kiltz, E.
    Neven, G.
    [J]. IET INFORMATION SECURITY, 2008, 2 (03) : 67 - 78
  • [4] Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
    Watanabe, Yohei
    Shikata, Junji
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 2016, 9614 : 255 - 279
  • [5] Private Key Management in Hierarchical Identity-Based Encryption
    Liu, Zhongren
    Xu, Li
    Chen, Zhide
    Guo, Fuchun
    [J]. SITIS 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGIES & INTERNET BASED SYSTEMS, 2008, : 206 - 212
  • [6] Identity-based Hierarchical Designated Decryption
    Chang, Shu-Hui
    Li, Chuan-Ming
    Hwang, Tzonelih
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (04) : 1243 - 1259
  • [7] Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption
    Abdalla, Michel
    De Caro, Angelo
    Duong Hieu Phan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (06) : 1695 - 1706
  • [8] Anonymous hierarchical identity-based encryption (Without random oracles)
    Boyen, Xavier
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 290 - 307
  • [9] Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters
    Xing, Qianqian
    Wang, Baosheng
    Wang, Xiaofeng
    Tao, Jing
    [J]. PLOS ONE, 2018, 13 (04):
  • [10] Identity-based encryption: How to decrypt multiple ciphertexts using a single decryption key
    Guo, Fuchun
    Mu, Yi
    Chen, Zhide
    [J]. PAIRING-BASED CRYPTOGRAPHY - PAIRING 2007, 2007, 4575 : 392 - 406