Revocable Hierarchical Identity-Based Broadcast Encryption

被引:0
|
作者
Dawei Li [1 ]
Jianwei Liu [1 ]
Zongyang Zhang [1 ]
Qianhong Wu [1 ]
Weiran Liu [1 ]
机构
[1] the School of Electronic and Information Engineering,Beihang University
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Revocable Hierarchical Identity-Based Broadcast Encryption(RHIBBE); revocation; provable security;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
Hierarchical Identity-Based Broadcast Encryption(HIBBE) organizes users into a tree-like structure, and it allows users to delegate their decryption ability to subordinates and enable encryption to any subset of users while only intended users can decrypt. However, current HIBBE schemes do not support efficient revocation of private keys. Here, a new primitive called Revocable Hierarchical Identity-Based Broadcast Encryption(RHIBBE) is formalized that allows revocation of the HIBBE. Ciphertext indistinguishability is defined against the selectively Bounded Revocable Identity-Vector-Set and Chosen-Plaintext Attack(IND-s BRIVS-CPA). An IND-s BRIVS-CPA secure RHIBBE scheme is constructed with efficient revocation on prime-order bilinear groups. The unbounded version of the scheme is also shown to be secure but a little weaker than the former under the decisional n-Weak Bilinear Diffie-Hellman inversion assumption.
引用
收藏
页码:539 / 549
页数:11
相关论文
共 50 条
  • [41] On the Power of Hierarchical Identity-Based Encryption
    Mahmoody, Mohammad
    Mohammed, Ameer
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 243 - 272
  • [42] Revocable Identity-Based Encryption Scheme with Leakage-Resilience
    Zhou Y.-W.
    Yang B.
    Xia Z.
    Lai Q.-Q.
    Zhang M.-W.
    Mu Y.
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (08): : 1534 - 1554
  • [43] Revocable Identity-Based Encryption from Codes with Rank Metric
    Chang, Donghoon
    Chauhan, Amit Kumar
    Kumar, Sandeep
    Sanadhya, Somitra Kumar
    TOPICS IN CRYPTOLOGY - CT-RSA 2018, 2018, 10808 : 435 - 451
  • [44] Constructions of CCA-Secure Revocable Identity-Based Encryption
    Ishida, Yuu
    Watanabe, Yohei
    Shikata, Junji
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 174 - 191
  • [45] An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Xia, Xiaonan
    Zheng, Kangjia
    PLOS ONE, 2014, 9 (09):
  • [46] Delegate and Verify the Update Keys of Revocable Identity-Based Encryption
    Lee, Kwangsu
    IEEE ACCESS, 2023, 11 : 52636 - 52652
  • [47] Efficient revocable identity-based encryption from multilinear maps
    Mao, Xianping
    Lai, Junzuo
    Chen, Kefei
    Weng, Jian
    Mei, Qixiang
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3511 - 3522
  • [48] On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices
    Zhang, Yanhua
    Liu, Ximeng
    Hu, Yupu
    Jia, Huiwen
    NETWORK AND SYSTEM SECURITY, NSS 2021, 2021, 13041 : 79 - 99
  • [49] Revocable Identity-Based Encryption Revisited: Security Model and Construction
    Seo, Jae Hong
    Emura, Keita
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 216 - 234
  • [50] Revocable Identity-Based Encryption with Decryption Key Exposure Resistance
    Wang, Xiaoyi
    Chen, Hu
    Zhao, Jiangdong
    Computer Engineering and Applications, 2024, 60 (19) : 268 - 277