Delegate and Verify the Update Keys of Revocable Identity-Based Encryption

被引:0
|
作者
Lee, Kwangsu [1 ,2 ,3 ,4 ]
机构
[1] Yonsei Univ, Comp Sci, Seoul, South Korea
[2] Korea Adv Inst Sci & Technol, Comp Sci, Daejeon, South Korea
[3] Korea Univ, Informat Secur, Seoul, South Korea
[4] Sejong Univ, Dept Comp & Informat Secur, Seoul, South Korea
关键词
Binary trees; Servers; Security; Public key; Identity-based encryption; Encryption; Hash functions; key revocation; subset cover; update key delegation; public verifiability; BROADCAST ENCRYPTION;
D O I
10.1109/ACCESS.2023.3280253
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Revocable identity-based encryption (RIBE) is an extension of identity-based encryption (IBE) and it supports efficient revocation of private keys. In the past, many efficient RIBE schemes have been proposed, but research on efficiently delegating the generation of update keys to a cloud server is somewhat insufficient. In this paper, we newly introduce the concept of delegated RIBE (DRIBE) that can delegate the generation of update keys to the semi-trusted cloud server and define the security models of DRIBE. Next, we propose a DRIBE scheme by generically combining a hierarchical IBE (HIBE) scheme, an identity-based broadcast encryption (IBBE) scheme, and a collision-resistant hash function. In addition, we propose a DRIBE-INC scheme that generates an occasional base update key and a periodic incremental update key to reduce the size of update keys in our DRIBE scheme.
引用
收藏
页码:52636 / 52652
页数:17
相关论文
共 50 条
  • [41] Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption
    Saravanakumar, S.
    Chitra, S.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (03): : 985 - 996
  • [42] Simplified Server-Aided Revocable Identity-Based Encryption from Lattices
    Zhang, Yanhua
    Liu, Ximeng
    Hu, Yupu
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 : 71 - 87
  • [43] Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem
    Hu, Ziyuan
    Liu, Shengli
    Chen, Kefei
    Liu, Joseph K.
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 265 - 283
  • [44] Revocable hierarchical identity-based encryption via history-free approach
    Seo, Jae Hong
    Emura, Keita
    THEORETICAL COMPUTER SCIENCE, 2016, 615 : 45 - 60
  • [45] Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability
    Wang, Xiaolei
    Wang, Yang
    Wang, Mingqiang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 535 - 544
  • [46] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [47] Identity-based broadcast encryption with constant size ciphertexts and private keys
    Delerablee, Cecile
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 200 - 215
  • [48] Hierarchical Identity-Based Encryption with Constant-Size Private Keys
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    ETRI JOURNAL, 2012, 34 (01) : 142 - 145
  • [49] Security of Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme
    Park, Seunghwan
    Lee, Dong Hoon
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (07): : 1933 - 1936
  • [50] An Efficient Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Jiang, Shengyi
    Wu, Jiayuan
    SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 506 - 515