Delegate and Verify the Update Keys of Revocable Identity-Based Encryption

被引:0
|
作者
Lee, Kwangsu [1 ,2 ,3 ,4 ]
机构
[1] Yonsei Univ, Comp Sci, Seoul, South Korea
[2] Korea Adv Inst Sci & Technol, Comp Sci, Daejeon, South Korea
[3] Korea Univ, Informat Secur, Seoul, South Korea
[4] Sejong Univ, Dept Comp & Informat Secur, Seoul, South Korea
关键词
Binary trees; Servers; Security; Public key; Identity-based encryption; Encryption; Hash functions; key revocation; subset cover; update key delegation; public verifiability; BROADCAST ENCRYPTION;
D O I
10.1109/ACCESS.2023.3280253
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Revocable identity-based encryption (RIBE) is an extension of identity-based encryption (IBE) and it supports efficient revocation of private keys. In the past, many efficient RIBE schemes have been proposed, but research on efficiently delegating the generation of update keys to a cloud server is somewhat insufficient. In this paper, we newly introduce the concept of delegated RIBE (DRIBE) that can delegate the generation of update keys to the semi-trusted cloud server and define the security models of DRIBE. Next, we propose a DRIBE scheme by generically combining a hierarchical IBE (HIBE) scheme, an identity-based broadcast encryption (IBBE) scheme, and a collision-resistant hash function. In addition, we propose a DRIBE-INC scheme that generates an occasional base update key and a periodic incremental update key to reduce the size of update keys in our DRIBE scheme.
引用
收藏
页码:52636 / 52652
页数:17
相关论文
共 50 条
  • [21] An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Xia, Xiaonan
    Zheng, Kangjia
    PLOS ONE, 2014, 9 (09):
  • [22] Efficient revocable identity-based encryption from multilinear maps
    Mao, Xianping
    Lai, Junzuo
    Chen, Kefei
    Weng, Jian
    Mei, Qixiang
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3511 - 3522
  • [23] On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices
    Zhang, Yanhua
    Liu, Ximeng
    Hu, Yupu
    Jia, Huiwen
    NETWORK AND SYSTEM SECURITY, NSS 2021, 2021, 13041 : 79 - 99
  • [24] Revocable Identity-Based Encryption Revisited: Security Model and Construction
    Seo, Jae Hong
    Emura, Keita
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 216 - 234
  • [25] Revocable Identity-Based Encryption with Decryption Key Exposure Resistance
    Wang, Xiaoyi
    Chen, Hu
    Zhao, Jiangdong
    Computer Engineering and Applications, 2024, 60 (19) : 268 - 277
  • [26] Adaptive-ID Secure Revocable Identity-Based Encryption
    Libert, Benoit
    Vergnaud, Damien
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 1 - +
  • [27] Efficient revocable identity-based encryption with short public parameters
    Emura, Keita
    Seo, Jae Hong
    Watanabe, Yohei
    THEORETICAL COMPUTER SCIENCE, 2021, 863 : 127 - 155
  • [28] Revocable identity-based encryption with server-aided ciphertext evolution
    Sun, Yinxia
    Mu, Yi
    Susilo, Willy
    Zhang, Futai
    Fu, Anmin
    THEORETICAL COMPUTER SCIENCE, 2020, 815 : 11 - 24
  • [29] New Constructions of Revocable Identity-Based Encryption From Multilinear Maps
    Park, Seunghwan
    Lee, Kwangsu
    Lee, Dong Hoon
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (08) : 1564 - 1577
  • [30] Efficient revocable hierarchical identity-based encryption using cryptographic accumulators
    Hongyong Jia
    Yue Chen
    Julong Lan
    Kaixiang Huang
    Jun Wang
    International Journal of Information Security, 2018, 17 : 477 - 490