Delegate and Verify the Update Keys of Revocable Identity-Based Encryption

被引:0
|
作者
Lee, Kwangsu [1 ,2 ,3 ,4 ]
机构
[1] Yonsei Univ, Comp Sci, Seoul, South Korea
[2] Korea Adv Inst Sci & Technol, Comp Sci, Daejeon, South Korea
[3] Korea Univ, Informat Secur, Seoul, South Korea
[4] Sejong Univ, Dept Comp & Informat Secur, Seoul, South Korea
关键词
Binary trees; Servers; Security; Public key; Identity-based encryption; Encryption; Hash functions; key revocation; subset cover; update key delegation; public verifiability; BROADCAST ENCRYPTION;
D O I
10.1109/ACCESS.2023.3280253
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Revocable identity-based encryption (RIBE) is an extension of identity-based encryption (IBE) and it supports efficient revocation of private keys. In the past, many efficient RIBE schemes have been proposed, but research on efficiently delegating the generation of update keys to a cloud server is somewhat insufficient. In this paper, we newly introduce the concept of delegated RIBE (DRIBE) that can delegate the generation of update keys to the semi-trusted cloud server and define the security models of DRIBE. Next, we propose a DRIBE scheme by generically combining a hierarchical IBE (HIBE) scheme, an identity-based broadcast encryption (IBBE) scheme, and a collision-resistant hash function. In addition, we propose a DRIBE-INC scheme that generates an occasional base update key and a periodic incremental update key to reduce the size of update keys in our DRIBE scheme.
引用
收藏
页码:52636 / 52652
页数:17
相关论文
共 50 条
  • [31] Efficient revocable identity-based encryption via subset difference methods
    Kwangsu Lee
    Dong Hoon Lee
    Jong Hwan Park
    Designs, Codes and Cryptography, 2017, 85 : 39 - 76
  • [32] Server-Aided Revocable Identity-Based Encryption from Lattices
    Khoa Nguyen
    Wang, Huaxiong
    Zhang, Juanyang
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 107 - 123
  • [33] Efficient revocable hierarchical identity-based encryption using cryptographic accumulators
    Jia, Hongyong
    Chen, Yue
    Lan, Julong
    Huang, Kaixiang
    Wang, Jun
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (04) : 477 - 490
  • [34] A generic construction for revocable identity-based encryption with subset difference methods
    Lee, Kwangsu
    PLOS ONE, 2020, 15 (09):
  • [35] Efficient revocable identity-based encryption via subset difference methods
    Lee, Kwangsu
    Lee, Dong Hoon
    Park, Jong Hwan
    DESIGNS CODES AND CRYPTOGRAPHY, 2017, 85 (01) : 39 - 76
  • [36] Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption
    Seo, Jae Hong
    Emura, Keita
    ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 21 - 38
  • [37] Identity-based encryption and hierarchical identity-based encryption
    University of Waterloo, Canada
    不详
    Cryptology Inf. Secur. Ser., 2009, (45-64):
  • [38] CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud
    Sun, Yinxia
    Susilo, Willy
    Zhang, Futai
    Fu, Anmin
    IEEE ACCESS, 2018, 6 : 56977 - 56983
  • [39] Revocable Identity-Based Encryption Scheme Under LWE Assumption the Standard Model
    Zhang, Yaling
    Wang, Shangping
    Du, Qing
    IEEE ACCESS, 2018, 6 : 65298 - 65307
  • [40] Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID Security
    Xing, Qianqian
    Wang, Baosheng
    Wang, Xiaofeng
    Chen, Peixin
    Yu, Bo
    Tang, Yong
    Gao, Xianming
    PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, : 430 - 437