Backward Compatible Identity-Based Encryption

被引:1
|
作者
Kim, Jongkil [1 ]
机构
[1] Ewha Womans Univ, Dept Cyber Secur, Seoul 03760, South Korea
关键词
identity-based encryption; public key encryption; revocation; IoT network security; cloud security; BROADCAST ENCRYPTION; SECURITY;
D O I
10.3390/s23094181
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In this paper, we present a new identity-based encryption (IBE) system that is named Backward Compatible Identity-based Encryption (BC-IBE). Our BC-IBE is proposed to solve the problem caused by the out-of-synchronization between users' private keys and ciphertexts. Encryption systems such as revocable IBE or revocable Attribute-based Encryption (ABE) often require updating private keys to revoke users after a certain time period. However, in those schemes, an updated key can be used to decrypt the ciphertexts created only during the current time period. Once the key is updated and the previous keys are removed, the user, the owner of the updated key, will lose access to the past ciphertexts. In our paper, we propose BC-IBE that supports backward compatibility, to solve this problem. In our proposed system, user's private keys and ciphertexts can be updated periodically with time tags, and these processes can be used to revoke users who do not receive an updated key as the other revocable encryption does. However, in our proposed system, a private key newly issued to a user is backward compatible. This means that it decrypts not only the ciphertexts at the present time period but also all past ciphertexts. This implies that our proposed scheme guarantees the decryption of all encrypted data even if they are not synchronized. Compared to the existing revocable identity-based encryption system, our proposed BC-IBE has the advantage of simplifying key management and securely delegating ciphertext updates. Our proposed scheme only requires a single backward-compatible private key to decrypt all past ciphertexts created. Moreover, the ciphertext update process in our proposed scheme does not require any special privileges and does not require decryption. This means that this process can be securely delegated to a third-party server, such as a cloud server, and it prevents the potential leakage of secrets. For those reasons, BC-IBE is suitable for a system where users are more dynamic, such as the Internet-of-Things (IoT) network, or a system that regularly updates the data, like cloud data storage. In this paper, we provide the construction of BC-IBE and prove its formal security.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    [J]. COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [2] Wildcarded Identity-Based Encryption
    Michel Abdalla
    James Birkett
    Dario Catalano
    Alexander W. Dent
    John Malone-Lee
    Gregory Neven
    Jacob C. N. Schuldt
    Nigel P. Smart
    [J]. Journal of Cryptology, 2011, 24 : 42 - 82
  • [3] Idealizing Identity-Based Encryption
    Hofheinz, Dennis
    Matt, Christian
    Maurer, Ueli
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 495 - 520
  • [4] Fuzzy identity-based encryption
    Sahai, A
    Waters, B
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 457 - 473
  • [5] Identity-based encryption and beyond
    Martin, Luther
    [J]. IEEE SECURITY & PRIVACY, 2008, 6 (05) : 62 - 64
  • [6] On the Anonymity of Identity-Based Encryption
    Luo, Song
    Hu, Ning
    [J]. JOURNAL OF APPLIED MATHEMATICS, 2013,
  • [7] Wildcarded Identity-Based Encryption
    Abdalla, Michel
    Birkett, James
    Catalano, Dario
    Dent, Alexander W.
    Malone-Lee, John
    Neven, Gregory
    Schuldt, Jacob C. N.
    Smart, Nigel P.
    [J]. JOURNAL OF CRYPTOLOGY, 2011, 24 (01) : 42 - 82
  • [8] On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption
    Wan, Zhong-Mei
    Weng, Jian
    Lai, Xue-Jia
    Liu, Sheng-Li
    Li, Ji-Guo
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (01) : 243 - 259
  • [9] Identity-Based Authenticated Encryption with Identity Confidentiality
    Zhao, Yunlei
    [J]. COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 633 - 653
  • [10] Anonymous Identity-Based Encryption with Identity Recovery
    Ma, Xuecheng
    Wang, Xin
    Lin, Dongdai
    [J]. INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 360 - 375