Revocable identity-based matchmaking encryption in the standard model

被引:2
|
作者
Jiang, Zhe [1 ]
Wang, Xiwen [1 ]
Zhang, Kai [1 ]
Gong, Junqing [2 ]
Chen, Jie [2 ]
Qian, Haifeng [2 ]
机构
[1] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Shanghai, Peoples R China
[2] East China Normal Univ, Software Engn Inst, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
cryptography; public key cryptography;
D O I
10.1049/ise2.12116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based Matchmaking Encryption (IB-ME) is an extension notion of matchmaking encryption (CRYPTO 2019), where a sender and a receiver can specify an access policy for the other party. In IB-ME, data encryption is performed by not only a receiver identity but also a sender's encryption key. Nevertheless, previous IB-ME schemes have not considered the problem of efficient revocation. Hence, the authors introduce a new notion of revocable IB-ME (RIB-ME) and formalise the syntax and security model of RIB-ME. In particular, the authors give an effective and simple construction of RIB-ME in the standard model, whose security is reduced to the hardness of decisional bilinear Diffie-Hellman problem and computational Diffie-Hellman problem. In addition, the authors show two extensions of our RIB-ME scheme to consider chosen-ciphertext security and forward privacy.
引用
收藏
页码:567 / 581
页数:15
相关论文
共 50 条
  • [1] Identity-Based Matchmaking Encryption from Standard Assumptions
    Chen, Jie
    Li, Yu
    Wen, Jinming
    Weng, Jian
    [J]. ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III, 2022, 13793 : 394 - 422
  • [2] Revocable Identity-Based Encryption Scheme Under LWE Assumption the Standard Model
    Zhang, Yaling
    Wang, Shangping
    Du, Qing
    [J]. IEEE ACCESS, 2018, 6 : 65298 - 65307
  • [3] Identity-Based Matchmaking Encryption from Standard Lattice Assumptions
    Belfiore, Roberta Cimorelli
    De Cosmo, Andrea
    Ferrara, Anna Lisa
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT II, 2024, 14584 : 163 - 188
  • [4] Revocable hierarchical identity-based encryption
    Seo, Jae Hong
    Emura, Keita
    [J]. THEORETICAL COMPUTER SCIENCE, 2014, 542 : 44 - 62
  • [5] Mergeable and Revocable Identity-Based Encryption
    Xu, Shengmin
    Yang, Guomin
    Mu, Yi
    Susilo, Willy
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 : 147 - 167
  • [6] Revocable Identity-Based Encryption Revisited: Security Model and Construction
    Seo, Jae Hong
    Emura, Keita
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 216 - 234
  • [7] Revocable Hierarchical Identity-Based Broadcast Encryption
    Dawei Li
    Jianwei Liu
    Zongyang Zhang
    Qianhong Wu
    Weiran Liu
    [J]. Tsinghua Science and Technology, 2018, 23 (05) : 539 - 549
  • [8] Revocable Identity-Based Encryption with Rejoin Functionality
    Seo, Jae Hong
    Emura, Keita
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (08) : 1806 - 1809
  • [9] Revocable Hierarchical Identity-Based Broadcast Encryption
    Li, Dawei
    Liu, Jianwei
    Zhang, Zongyang
    Wu, Qianhong
    Liu, Weiran
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 539 - 549
  • [10] Identity-Based Matchmaking Encryption with Equality Test
    Yan, Zhen
    Lin, Xijun
    Zhang, Xiaoshuai
    Xu, Jianliang
    Qu, Haipeng
    [J]. ENTROPY, 2024, 26 (01)