Hierarchical identity-based encryption without key delegation in decryption

被引:0
|
作者
Luo, Song [1 ]
Chen, Zhong [2 ,3 ]
机构
[1] Chongqing Univ Technol, Coll Comp Sci & Engn, Chongqing 400054, Peoples R China
[2] Peking Univ, Sch Elect Engn & Comp Sci, Inst Software, Beijing 100871, Peoples R China
[3] Peking Univ, Minist Educ, Key Lab High Confidence Software Technol, Beijing 100871, Peoples R China
关键词
hierarchical identity-based encryption; key delegation; decryption; standard model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hierarchical Identity-Based Encryption (HIBE) is a generalisation of Identity- Based Encryption (IBE) which mirrors an organisational hierarchy. However, when the user decrypts a ciphertext encrypted to a hierarchical identity, he/she should know the exact hierarchical identity in order to run the delegate algorithm to get the secret key corresponding to the target hierarchical identity if the hierarchical identity linked with his/her key is a prefix of the target hierarchical identity. In this paper, we consider a new concept called HIBE without key delegation in decryption. In such HIBE systems, the user can decrypt the ciphertext directly without running the delegate algorithm even if his hierarchical identity is only a prefix of the target hierarchical identity. We present two HIBE systems, which are proven secure in the standard model under the decision BDH and l-BDHE assumptions, respectively. Both systems have the same decryption efficiency in pairing, compared with BB1-HIBE system and BBG-HIBE system, respectively.
引用
收藏
页码:71 / 79
页数:9
相关论文
共 50 条
  • [31] Tightly Secure Hierarchical Identity-Based Encryption
    Roman Langrehr
    Jiaxin Pan
    [J]. Journal of Cryptology, 2020, 33 : 1787 - 1821
  • [32] Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme
    Weng, Jian
    Chen, Min-Rong
    Chen, Kefei
    Deng, Robert H.
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (04) : 854 - 856
  • [33] A Scheme for Key Distribution in Wireless Sensor Network Based on Hierarchical Identity-Based Encryption
    Liu, Yan
    Wu, Xiumei
    Chen, Xuemin
    [J]. 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2015, : 539 - 543
  • [34] A Hierarchical Key Management Scheme for Wireless Sensor Networks Based on Identity-based Encryption
    Hu, Shuaiqi
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2015, : 384 - 389
  • [35] HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES
    Ren, Yanli
    Gu, Dawu
    Wang, Shuozhong
    Zhang, Xinpengu
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2010, 21 (06) : 1049 - 1063
  • [36] Key updating technique in identity-based encryption
    Liu, Shengli
    Long, Yu
    Chen, Kefei
    [J]. INFORMATION SCIENCES, 2011, 181 (11) : 2436 - 2440
  • [37] Identity-based threshold key-insulated encryption without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Zheng, Dong
    Qiu, Weidong
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 203 - +
  • [38] Identity Based Group Signatures from Hierarchical Identity-Based Encryption
    Smart, Nigel P.
    Warinschi, Bogdan
    [J]. PAIRING-BASED CRYPTOGRAPHY - PAIRING 2009, 2009, 5671 : 150 - 170
  • [39] Identity-based threshold decryption
    Baek, J
    Zheng, YL
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS, 2004, 2947 : 262 - 276
  • [40] Revocable identity-based encryption with bounded decryption key exposure resistance: Lattice-based construction and more.
    Takayasu, Atsushi
    Watanabe, Yohei
    [J]. THEORETICAL COMPUTER SCIENCE, 2021, 849 : 64 - 98