Backward Compatible Identity-Based Encryption

被引:1
|
作者
Kim, Jongkil [1 ]
机构
[1] Ewha Womans Univ, Dept Cyber Secur, Seoul 03760, South Korea
关键词
identity-based encryption; public key encryption; revocation; IoT network security; cloud security; BROADCAST ENCRYPTION; SECURITY;
D O I
10.3390/s23094181
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In this paper, we present a new identity-based encryption (IBE) system that is named Backward Compatible Identity-based Encryption (BC-IBE). Our BC-IBE is proposed to solve the problem caused by the out-of-synchronization between users' private keys and ciphertexts. Encryption systems such as revocable IBE or revocable Attribute-based Encryption (ABE) often require updating private keys to revoke users after a certain time period. However, in those schemes, an updated key can be used to decrypt the ciphertexts created only during the current time period. Once the key is updated and the previous keys are removed, the user, the owner of the updated key, will lose access to the past ciphertexts. In our paper, we propose BC-IBE that supports backward compatibility, to solve this problem. In our proposed system, user's private keys and ciphertexts can be updated periodically with time tags, and these processes can be used to revoke users who do not receive an updated key as the other revocable encryption does. However, in our proposed system, a private key newly issued to a user is backward compatible. This means that it decrypts not only the ciphertexts at the present time period but also all past ciphertexts. This implies that our proposed scheme guarantees the decryption of all encrypted data even if they are not synchronized. Compared to the existing revocable identity-based encryption system, our proposed BC-IBE has the advantage of simplifying key management and securely delegating ciphertext updates. Our proposed scheme only requires a single backward-compatible private key to decrypt all past ciphertexts created. Moreover, the ciphertext update process in our proposed scheme does not require any special privileges and does not require decryption. This means that this process can be securely delegated to a third-party server, such as a cloud server, and it prevents the potential leakage of secrets. For those reasons, BC-IBE is suitable for a system where users are more dynamic, such as the Internet-of-Things (IoT) network, or a system that regularly updates the data, like cloud data storage. In this paper, we provide the construction of BC-IBE and prove its formal security.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Scalable Wildcarded Identity-Based Encryption
    Kim, Jihye
    Lee, Seunghwa
    Lee, Jiwon
    Oh, Hyunok
    [J]. COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 : 269 - 287
  • [32] Identity-Based Encryption with Forward Security
    Li, Hongwei
    Yang, Haomiao
    Li, Fan
    [J]. 2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 287 - 290
  • [33] Identity-based encryption gone wild
    Abdalla, Michel
    Catalano, Dario
    Dent, Alexander W.
    Malone-Lee, John
    Neven, Gregory
    Smart, Nigel P.
    [J]. AUTOMATA, LANGAGES AND PROGRAMMING, PT 2, 2006, 4052 : 300 - 311
  • [34] Identity-Based Group Encryption Revisited
    Gupta, Kanika
    Selvi, S. Sharmila Deva
    Rangan, C. Pandu
    Dighe, Shubham Sopan
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 205 - 209
  • [35] On the Power of Hierarchical Identity-Based Encryption
    Mahmoody, Mohammad
    Mohammed, Ameer
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 243 - 272
  • [36] Identification of parts in identity-based encryption
    Stephanides, G
    Constantinescu, N
    [J]. INTERNET SOCIETY: ADVANCES IN LEARNING, COMMERCE AND SOCIETY, 2004, 1 : 177 - 181
  • [37] Identity-Based Encryption in the Internet of Things
    Genc, Yasin
    Afacan, Erkan
    [J]. 29TH IEEE CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS (SIU 2021), 2021,
  • [38] Identity-Based Threshold Encryption on Lattices with Application to Searchable Encryption
    Kuchta, Veronika
    Markowitch, Olivier
    [J]. APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, 2016, 651 : 117 - 129
  • [39] Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
    Shao, Jun
    Cao, Zhenfu
    [J]. INFORMATION SCIENCES, 2012, 206 : 83 - 95
  • [40] Proxy re-encryption systems for identity-based encryption
    Matsuo, Toshihiko
    [J]. Pairing-Based Cryptography - Pairing 2007, 2007, 4575 : 247 - 267