Poster: Post-Quantum Identity-Based Matching Encryption with Revocable Decryption Key

被引:0
|
作者
Huang, Jheng-Jia [1 ]
Chen, Guan-Yu [1 ]
Lo, Nai-Wei [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan
关键词
Post-quantum cryptography; Source authentication; Access control;
D O I
10.1145/3658644.3691397
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, scholars have developed Identity-Based Matching Encryption (IB-ME), which enables both the sender and the receiver to specify identities, ensuring ciphertext confidentiality only when these identities match. Building on this concept, our work introduces Revocable Identity-Based Matching Encryption (RIB-ME), which incorporates a revocable mechanism to withdraw decryption rights from unauthorized users. Current RIB-ME schemes rely on a variant of the Diffie-Hellman assumption, rendering it susceptible to quantum computing attacks. To address this vulnerability, we propose a generic construction of RIB-ME inspired by Wang et al. Our approach employs two-level Revocable Hierarchical Identity-Based Encryption (RHIBE) and Identity-Based Signature (IBS) and is compatible with post-quantum encryption schemes. This enables the development of a generic construction of RIB-ME and the creation of the first post-quantum RIB-ME through the use of post-quantum constructions.
引用
收藏
页码:5006 / 5008
页数:3
相关论文
共 50 条
  • [1] Revocable Identity-Based Encryption with Decryption Key Exposure Resistance
    Wang, Xiaoyi
    Chen, Hu
    Zhao, Jiangdong
    Computer Engineering and Applications, 2024, 60 (19) : 268 - 277
  • [2] Post-Quantum Secure Identity-Based Matchmaking Encryption
    Wang, Huige
    Chen, Kefei
    Xie, Qi
    Meng, Qian
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (01) : 833 - 844
  • [3] Towards Post-Quantum Enhanced Identity-Based Encryption
    Verchyk, Dariia
    Sepulveda, Johanna
    2021 24TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2021), 2021, : 502 - 509
  • [4] Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption Key Exposure Resistance
    Takayasu, Atsushi
    Watanabe, Yohei
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 : 184 - 204
  • [5] A practical study of post-quantum enhanced identity-based encryption
    Verchyk, Dariia
    Sepulveda, Johanna
    MICROPROCESSORS AND MICROSYSTEMS, 2023, 99
  • [6] Efficient Post-quantum Identity-based Encryption with Equality Test
    Susilo, Willy
    Dung Hoang Duong
    Huy Quoc Le
    2020 IEEE 26TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2020, : 633 - 640
  • [7] Compact Post-quantum Bounded-Collusion Identity-Based Encryption
    Sato, Shingo
    Shikata, Junji
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2024, PT I, 2025, 14905 : 101 - 122
  • [8] Revocable identity-based encryption with bounded decryption key exposure resistance: Lattice-based construction and more.
    Takayasu, Atsushi
    Watanabe, Yohei
    THEORETICAL COMPUTER SCIENCE, 2021, 849 : 64 - 98
  • [9] Hierarchical identity-based encryption without key delegation in decryption
    Chen, Z. (chen@infosec.pku.edu.cn), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (05):
  • [10] Hierarchical identity-based encryption without key delegation in decryption
    Luo, Song
    Chen, Zhong
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2014, 5 (02) : 71 - 79