Poster: Post-Quantum Identity-Based Matching Encryption with Revocable Decryption Key

被引:0
|
作者
Huang, Jheng-Jia [1 ]
Chen, Guan-Yu [1 ]
Lo, Nai-Wei [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan
关键词
Post-quantum cryptography; Source authentication; Access control;
D O I
10.1145/3658644.3691397
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, scholars have developed Identity-Based Matching Encryption (IB-ME), which enables both the sender and the receiver to specify identities, ensuring ciphertext confidentiality only when these identities match. Building on this concept, our work introduces Revocable Identity-Based Matching Encryption (RIB-ME), which incorporates a revocable mechanism to withdraw decryption rights from unauthorized users. Current RIB-ME schemes rely on a variant of the Diffie-Hellman assumption, rendering it susceptible to quantum computing attacks. To address this vulnerability, we propose a generic construction of RIB-ME inspired by Wang et al. Our approach employs two-level Revocable Hierarchical Identity-Based Encryption (RHIBE) and Identity-Based Signature (IBS) and is compatible with post-quantum encryption schemes. This enables the development of a generic construction of RIB-ME and the creation of the first post-quantum RIB-ME through the use of post-quantum constructions.
引用
收藏
页码:5006 / 5008
页数:3
相关论文
共 50 条
  • [31] Efficient Post-Quantum TLS Handshakes using Identity-Based Key Exchange from Lattices
    Banerjee, Utsav
    Chandrakasan, Anantha P.
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [32] CsiIBS: A post-quantum identity-based signature scheme based on isogenies
    Peng, Cong
    Chen, Jianhua
    Zhou, Lu
    Choo, Kim-Kwang Raymond
    He, Debiao
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [33] Post-quantum secure recipient revocable broadcast encryption supporting anonymity
    Singh, Amit Kumar
    Acharya, Kamalesh
    Mukhopadhyay, Sourav
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (2) : 4519 - 4531
  • [34] Post-quantum secure recipient revocable broadcast encryption supporting anonymity
    Amit Kumar Singh
    Kamalesh Acharya
    Sourav Mukhopadhyay
    Multimedia Tools and Applications, 2024, 83 : 4519 - 4531
  • [35] Revocable Identity-Based Encryption from Codes with Rank Metric
    Chang, Donghoon
    Chauhan, Amit Kumar
    Kumar, Sandeep
    Sanadhya, Somitra Kumar
    TOPICS IN CRYPTOLOGY - CT-RSA 2018, 2018, 10808 : 435 - 451
  • [36] A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption
    Lee, Kwangsu
    Kim, Joon Sik
    IEEE ACCESS, 2022, 10 : 44178 - 44199
  • [37] Revocable Identity-Based Searchable Encryption Scheme for Smart Grid
    Wang, Aqian
    Qin, Baodong
    Fan, Yajun
    2024 6TH INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE PROCESSING, ICNLP 2024, 2024, : 722 - 727
  • [38] Revocable Identity-Based Encryption Scheme with Leakage-Resilience
    Zhou Y.-W.
    Yang B.
    Xia Z.
    Lai Q.-Q.
    Zhang M.-W.
    Mu Y.
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (08): : 1534 - 1554
  • [39] Simplified Revocable Hierarchical Identity-Based Encryption from Lattices
    Wang, Shixiong
    Zhang, Juanyang
    He, Jingnan
    Wang, Huaxiong
    Li, Chao
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 99 - 119
  • [40] Constructions of CCA-Secure Revocable Identity-Based Encryption
    Ishida, Yuu
    Watanabe, Yohei
    Shikata, Junji
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 174 - 191