Revocable hierarchical identity-based encryption with adaptive security

被引:0
|
作者
Lee, Kwangsu [1 ]
机构
[1] Sejong University, Gwangjin-gu, Seoul, Korea, Republic of
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Hierarchical identity-based encryption (HIBE) can be extended to revocable HIBE (RHIBE) if a private key of a user can be revoked when the private key is revealed or expired. Previously, many selectively secure RHIBE schemes were proposed, but it is still unsolved problem to construct an adaptively secure RHIBE scheme. In this work, we propose two RHIBE schemes in composite-order bilinear groups and prove their adaptive security under simple static assumptions. To prove the adaptive security, we use the dual system encryption framework, but it is not simple to use the dual system encryption framework in RHIBE since the security model of RHIBE is quite different with that of HIBE. We show that it is possible to solve the problem of the RHIBE security proof by carefully designing hybrid games. © 2021 The Author(s)
引用
收藏
页码:37 / 68
相关论文
共 50 条
  • [2] Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID Security
    Xing, Qianqian
    Wang, Baosheng
    Wang, Xiaofeng
    Chen, Peixin
    Yu, Bo
    Tang, Yong
    Gao, Xianming
    [J]. PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, : 430 - 437
  • [3] Revocable hierarchical identity-based encryption
    Seo, Jae Hong
    Emura, Keita
    [J]. THEORETICAL COMPUTER SCIENCE, 2014, 542 : 44 - 62
  • [4] Revocable Hierarchical Identity-Based Broadcast Encryption
    Dawei Li
    Jianwei Liu
    Zongyang Zhang
    Qianhong Wu
    Weiran Liu
    [J]. Tsinghua Science and Technology, 2018, 23 (05) : 539 - 549
  • [5] Revocable Hierarchical Identity-Based Broadcast Encryption
    Li, Dawei
    Liu, Jianwei
    Zhang, Zongyang
    Wu, Qianhong
    Liu, Weiran
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 539 - 549
  • [6] Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption
    Seo, Jae Hong
    Emura, Keita
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 21 - 38
  • [7] An Efficient Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Jiang, Shengyi
    Wu, Jiayuan
    [J]. SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 506 - 515
  • [8] Simplified Revocable Hierarchical Identity-Based Encryption from Lattices
    Wang, Shixiong
    Zhang, Juanyang
    He, Jingnan
    Wang, Huaxiong
    Li, Chao
    [J]. CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 99 - 119
  • [9] A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption
    Lee, Kwangsu
    Kim, Joon Sik
    [J]. IEEE ACCESS, 2022, 10 : 44178 - 44199
  • [10] Revocable Identity-Based Encryption Revisited: Security Model and Construction
    Seo, Jae Hong
    Emura, Keita
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 216 - 234