Delegate and Verify the Update Keys of Revocable Identity-Based Encryption

被引:0
|
作者
Lee, Kwangsu [1 ,2 ,3 ,4 ]
机构
[1] Yonsei Univ, Comp Sci, Seoul, South Korea
[2] Korea Adv Inst Sci & Technol, Comp Sci, Daejeon, South Korea
[3] Korea Univ, Informat Secur, Seoul, South Korea
[4] Sejong Univ, Dept Comp & Informat Secur, Seoul, South Korea
关键词
Binary trees; Servers; Security; Public key; Identity-based encryption; Encryption; Hash functions; key revocation; subset cover; update key delegation; public verifiability; BROADCAST ENCRYPTION;
D O I
10.1109/ACCESS.2023.3280253
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Revocable identity-based encryption (RIBE) is an extension of identity-based encryption (IBE) and it supports efficient revocation of private keys. In the past, many efficient RIBE schemes have been proposed, but research on efficiently delegating the generation of update keys to a cloud server is somewhat insufficient. In this paper, we newly introduce the concept of delegated RIBE (DRIBE) that can delegate the generation of update keys to the semi-trusted cloud server and define the security models of DRIBE. Next, we propose a DRIBE scheme by generically combining a hierarchical IBE (HIBE) scheme, an identity-based broadcast encryption (IBBE) scheme, and a collision-resistant hash function. In addition, we propose a DRIBE-INC scheme that generates an occasional base update key and a periodic incremental update key to reduce the size of update keys in our DRIBE scheme.
引用
收藏
页码:52636 / 52652
页数:17
相关论文
共 50 条
  • [1] Revocable hierarchical identity-based encryption with shorter private keys and update keys
    Lee, Kwangsu
    Park, Seunghwan
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (10) : 2407 - 2440
  • [2] Revocable hierarchical identity-based encryption with shorter private keys and update keys
    Kwangsu Lee
    Seunghwan Park
    Designs, Codes and Cryptography, 2018, 86 : 2407 - 2440
  • [3] Revocable hierarchical identity-based encryption
    Seo, Jae Hong
    Emura, Keita
    THEORETICAL COMPUTER SCIENCE, 2014, 542 : 44 - 62
  • [4] Mergeable and Revocable Identity-Based Encryption
    Xu, Shengmin
    Yang, Guomin
    Mu, Yi
    Susilo, Willy
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 : 147 - 167
  • [5] Revocable Identity-Based Encryption with Rejoin Functionality
    Seo, Jae Hong
    Emura, Keita
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (08) : 1806 - 1809
  • [6] Revocable Hierarchical Identity-Based Broadcast Encryption
    Dawei Li
    Jianwei Liu
    Zongyang Zhang
    Qianhong Wu
    Weiran Liu
    Tsinghua Science and Technology, 2018, 23 (05) : 539 - 549
  • [7] Revocable Hierarchical Identity-Based Broadcast Encryption
    Li, Dawei
    Liu, Jianwei
    Zhang, Zongyang
    Wu, Qianhong
    Liu, Weiran
    TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 539 - 549
  • [8] Forward-Secure Revocable Identity-Based Encryption
    Qin, Baodong
    Bai, Xue
    Zheng, Dong
    Cui, Hui
    Luo, Yiyuan
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT II, 2021, 12919 : 321 - 340
  • [9] Server-Aided Revocable Identity-Based Encryption
    Qin, Baodong
    Deng, Robert H.
    Li, Yingjiu
    Liu, Shengli
    COMPUTER SECURITY - ESORICS 2015, PT I, 2015, 9326 : 286 - 304
  • [10] Cloud-aided scalable revocable identity-based encryption scheme with ciphertext update
    Wang, Changji
    Li, Yuan
    Fang, Jian
    Xie, Jianguo
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (20):