Hierarchical identity-based encryption without key delegation in decryption

被引:0
|
作者
Luo, Song [1 ]
Chen, Zhong [2 ,3 ]
机构
[1] Chongqing Univ Technol, Coll Comp Sci & Engn, Chongqing 400054, Peoples R China
[2] Peking Univ, Sch Elect Engn & Comp Sci, Inst Software, Beijing 100871, Peoples R China
[3] Peking Univ, Minist Educ, Key Lab High Confidence Software Technol, Beijing 100871, Peoples R China
关键词
hierarchical identity-based encryption; key delegation; decryption; standard model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hierarchical Identity-Based Encryption (HIBE) is a generalisation of Identity- Based Encryption (IBE) which mirrors an organisational hierarchy. However, when the user decrypts a ciphertext encrypted to a hierarchical identity, he/she should know the exact hierarchical identity in order to run the delegate algorithm to get the secret key corresponding to the target hierarchical identity if the hierarchical identity linked with his/her key is a prefix of the target hierarchical identity. In this paper, we consider a new concept called HIBE without key delegation in decryption. In such HIBE systems, the user can decrypt the ciphertext directly without running the delegate algorithm even if his hierarchical identity is only a prefix of the target hierarchical identity. We present two HIBE systems, which are proven secure in the standard model under the decision BDH and l-BDHE assumptions, respectively. Both systems have the same decryption efficiency in pairing, compared with BB1-HIBE system and BBG-HIBE system, respectively.
引用
收藏
页码:71 / 79
页数:9
相关论文
共 50 条
  • [21] Identity-based hierarchical strongly key-insulated encryption and its application
    Hanaoka, Y
    Hanaoka, G
    Shikata, J
    Imai, H
    [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 495 - 514
  • [22] Revocable Hierarchical Identity-Based Broadcast Encryption
    Dawei Li
    Jianwei Liu
    Zongyang Zhang
    Qianhong Wu
    Weiran Liu
    [J]. Tsinghua Science and Technology, 2018, 23 (05) : 539 - 549
  • [23] Efficient identity-based encryption with Hierarchical key-insulation from HIBE
    Keita Emura
    Atsushi Takayasu
    Yohei Watanabe
    [J]. Designs, Codes and Cryptography, 2021, 89 : 2397 - 2431
  • [24] Efficient identity-based encryption with Hierarchical key-insulation from HIBE
    Emura, Keita
    Takayasu, Atsushi
    Watanabe, Yohei
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (10) : 2397 - 2431
  • [25] Revocable Hierarchical Identity-Based Broadcast Encryption
    Li, Dawei
    Liu, Jianwei
    Zhang, Zongyang
    Wu, Qianhong
    Liu, Weiran
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 539 - 549
  • [26] Hierarchical Identity-Based Online/Offline Encryption
    Liu, Zhongren
    Xu, Li
    Chen, Zhide
    Mu, Yi
    Guo, Fuchun
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2115 - +
  • [27] Tightly Secure Hierarchical Identity-Based Encryption
    Langrehr, Roman
    Pan, Jiaxin
    [J]. JOURNAL OF CRYPTOLOGY, 2020, 33 (04) : 1787 - 1821
  • [28] Tightly Secure Hierarchical Identity-Based Encryption
    Roman Langrehr
    Jiaxin Pan
    [J]. Journal of Cryptology, 2020, 33 : 1787 - 1821
  • [29] Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme
    Weng, Jian
    Chen, Min-Rong
    Chen, Kefei
    Deng, Robert H.
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (04) : 854 - 856
  • [30] A Scheme for Key Distribution in Wireless Sensor Network Based on Hierarchical Identity-Based Encryption
    Liu, Yan
    Wu, Xiumei
    Chen, Xuemin
    [J]. 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2015, : 539 - 543