Revocable Hierarchical Identity-Based Broadcast Encryption

被引:0
|
作者
Dawei Li [1 ]
Jianwei Liu [1 ]
Zongyang Zhang [1 ]
Qianhong Wu [1 ]
Weiran Liu [1 ]
机构
[1] the School of Electronic and Information Engineering,Beihang University
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Revocable Hierarchical Identity-Based Broadcast Encryption(RHIBBE); revocation; provable security;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
Hierarchical Identity-Based Broadcast Encryption(HIBBE) organizes users into a tree-like structure, and it allows users to delegate their decryption ability to subordinates and enable encryption to any subset of users while only intended users can decrypt. However, current HIBBE schemes do not support efficient revocation of private keys. Here, a new primitive called Revocable Hierarchical Identity-Based Broadcast Encryption(RHIBBE) is formalized that allows revocation of the HIBBE. Ciphertext indistinguishability is defined against the selectively Bounded Revocable Identity-Vector-Set and Chosen-Plaintext Attack(IND-s BRIVS-CPA). An IND-s BRIVS-CPA secure RHIBBE scheme is constructed with efficient revocation on prime-order bilinear groups. The unbounded version of the scheme is also shown to be secure but a little weaker than the former under the decisional n-Weak Bilinear Diffie-Hellman inversion assumption.
引用
收藏
页码:539 / 549
页数:11
相关论文
共 50 条
  • [1] Revocable Hierarchical Identity-Based Broadcast Encryption
    Li, Dawei
    Liu, Jianwei
    Zhang, Zongyang
    Wu, Qianhong
    Liu, Weiran
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 539 - 549
  • [2] Revocable hierarchical identity-based encryption
    Seo, Jae Hong
    Emura, Keita
    [J]. THEORETICAL COMPUTER SCIENCE, 2014, 542 : 44 - 62
  • [3] Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 242 - 257
  • [6] Simplified Revocable Hierarchical Identity-Based Encryption from Lattices
    Wang, Shixiong
    Zhang, Juanyang
    He, Jingnan
    Wang, Huaxiong
    Li, Chao
    [J]. CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 99 - 119
  • [7] A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption
    Lee, Kwangsu
    Kim, Joon Sik
    [J]. IEEE ACCESS, 2022, 10 : 44178 - 44199
  • [8] Mergeable and Revocable Identity-Based Encryption
    Xu, Shengmin
    Yang, Guomin
    Mu, Yi
    Susilo, Willy
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 : 147 - 167
  • [9] Efficient revocable hierarchical identity-based encryption using cryptographic accumulators
    Hongyong Jia
    Yue Chen
    Julong Lan
    Kaixiang Huang
    Jun Wang
    [J]. International Journal of Information Security, 2018, 17 : 477 - 490
  • [10] Identity-based encryption and hierarchical identity-based encryption
    University of Waterloo, Canada
    不详
    [J]. Cryptology Inf. Secur. Ser., 2009, (45-64):