Revocable Hierarchical Identity-Based Broadcast Encryption

被引:0
|
作者
Dawei Li [1 ]
Jianwei Liu [1 ]
Zongyang Zhang [1 ]
Qianhong Wu [1 ]
Weiran Liu [1 ]
机构
[1] the School of Electronic and Information Engineering,Beihang University
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Revocable Hierarchical Identity-Based Broadcast Encryption(RHIBBE); revocation; provable security;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
Hierarchical Identity-Based Broadcast Encryption(HIBBE) organizes users into a tree-like structure, and it allows users to delegate their decryption ability to subordinates and enable encryption to any subset of users while only intended users can decrypt. However, current HIBBE schemes do not support efficient revocation of private keys. Here, a new primitive called Revocable Hierarchical Identity-Based Broadcast Encryption(RHIBBE) is formalized that allows revocation of the HIBBE. Ciphertext indistinguishability is defined against the selectively Bounded Revocable Identity-Vector-Set and Chosen-Plaintext Attack(IND-s BRIVS-CPA). An IND-s BRIVS-CPA secure RHIBBE scheme is constructed with efficient revocation on prime-order bilinear groups. The unbounded version of the scheme is also shown to be secure but a little weaker than the former under the decisional n-Weak Bilinear Diffie-Hellman inversion assumption.
引用
收藏
页码:539 / 549
页数:11
相关论文
共 50 条
  • [21] Security of identity-based broadcast encryption
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2010, 40 (01): : 165 - 170
  • [22] An Efficient Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Jiang, Shengyi
    Wu, Jiayuan
    SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 506 - 515
  • [23] Forward-Secure Revocable Identity-Based Encryption
    Qin, Baodong
    Bai, Xue
    Zheng, Dong
    Cui, Hui
    Luo, Yiyuan
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT II, 2021, 12919 : 321 - 340
  • [24] Server-Aided Revocable Identity-Based Encryption
    Qin, Baodong
    Deng, Robert H.
    Li, Yingjiu
    Liu, Shengli
    COMPUTER SECURITY - ESORICS 2015, PT I, 2015, 9326 : 286 - 304
  • [25] Revocable identity-based matchmaking encryption in the standard model
    Jiang, Zhe
    Wang, Xiwen
    Zhang, Kai
    Gong, Junqing
    Chen, Jie
    Qian, Haifeng
    IET INFORMATION SECURITY, 2023, 17 (04) : 567 - 581
  • [26] Outsourced revocable identity-based encryption from lattices
    Dong, Chengcheng
    Yang, Kang
    Qiu, Jian
    Chen, Yuanfang
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (11):
  • [27] Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    Li, Yan
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (01) : 35 - 50
  • [28] Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption
    Weiran Liu
    Jianwei Liu
    Qianhong Wu
    Bo Qin
    Yan Li
    International Journal of Information Security, 2016, 15 : 35 - 50
  • [29] Revocable Hierarchical Identity-Based Authenticated Key Exchange
    Okano, Yuki
    Tomida, Junichi
    Nagai, Akira
    Yoneyama, Kazuki
    Fujioka, Atsushi
    Suzuki, Koutarou
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021, 2022, 13218 : 3 - 27
  • [30] Augmented broadcaster identity-based broadcast encryption
    1600, Digital Information Research Foundation, 2 Srinivasamoorthy Avenue, L.B Road, Adyar, Chennai, 600 020, India (11):