Poster: Post-Quantum Identity-Based Matching Encryption with Revocable Decryption Key

被引:0
|
作者
Huang, Jheng-Jia [1 ]
Chen, Guan-Yu [1 ]
Lo, Nai-Wei [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan
关键词
Post-quantum cryptography; Source authentication; Access control;
D O I
10.1145/3658644.3691397
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, scholars have developed Identity-Based Matching Encryption (IB-ME), which enables both the sender and the receiver to specify identities, ensuring ciphertext confidentiality only when these identities match. Building on this concept, our work introduces Revocable Identity-Based Matching Encryption (RIB-ME), which incorporates a revocable mechanism to withdraw decryption rights from unauthorized users. Current RIB-ME schemes rely on a variant of the Diffie-Hellman assumption, rendering it susceptible to quantum computing attacks. To address this vulnerability, we propose a generic construction of RIB-ME inspired by Wang et al. Our approach employs two-level Revocable Hierarchical Identity-Based Encryption (RHIBE) and Identity-Based Signature (IBS) and is compatible with post-quantum encryption schemes. This enables the development of a generic construction of RIB-ME and the creation of the first post-quantum RIB-ME through the use of post-quantum constructions.
引用
收藏
页码:5006 / 5008
页数:3
相关论文
共 50 条
  • [41] An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Xia, Xiaonan
    Zheng, Kangjia
    PLOS ONE, 2014, 9 (09):
  • [42] Delegate and Verify the Update Keys of Revocable Identity-Based Encryption
    Lee, Kwangsu
    IEEE ACCESS, 2023, 11 : 52636 - 52652
  • [43] Efficient revocable identity-based encryption from multilinear maps
    Mao, Xianping
    Lai, Junzuo
    Chen, Kefei
    Weng, Jian
    Mei, Qixiang
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3511 - 3522
  • [44] Revocable Hierarchical Identity-Based Authenticated Key Exchange
    Okano, Yuki
    Tomida, Junichi
    Nagai, Akira
    Yoneyama, Kazuki
    Fujioka, Atsushi
    Suzuki, Koutarou
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021, 2022, 13218 : 3 - 27
  • [45] On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices
    Zhang, Yanhua
    Liu, Ximeng
    Hu, Yupu
    Jia, Huiwen
    NETWORK AND SYSTEM SECURITY, NSS 2021, 2021, 13041 : 79 - 99
  • [46] Revocable Identity-Based Encryption Revisited: Security Model and Construction
    Seo, Jae Hong
    Emura, Keita
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 216 - 234
  • [47] Adaptive-ID Secure Revocable Identity-Based Encryption
    Libert, Benoit
    Vergnaud, Damien
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 1 - +
  • [48] Efficient revocable identity-based encryption with short public parameters
    Emura, Keita
    Seo, Jae Hong
    Watanabe, Yohei
    THEORETICAL COMPUTER SCIENCE, 2021, 863 : 127 - 155
  • [49] Post-quantum secure identity-based signature achieving forward secrecy
    Shaw, Surbhi
    Dutta, Ratna
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 69
  • [50] Revocable identity-based encryption with server-aided ciphertext evolution
    Sun, Yinxia
    Mu, Yi
    Susilo, Willy
    Zhang, Futai
    Fu, Anmin
    THEORETICAL COMPUTER SCIENCE, 2020, 815 : 11 - 24