Private Key Management in Hierarchical Identity-Based Encryption

被引:0
|
作者
Liu, Zhongren [1 ]
Xu, Li [1 ]
Chen, Zhide [1 ]
Guo, Fuchun [1 ]
机构
[1] Fujian Normal Univ, Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
关键词
D O I
10.1109/SITIS.2007.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hierarchical Identity-Based Encryption (HIBE) is a generalization of IBE that mirrors an organizational hierarchy, which consists of a root private key generator (PKG), domain PKGs and users. In a traditional HIBE system, users retrieve private keys from their domain PKGs, while domain PKGs request domain secret keys from the root PKG. What's more, the manager of each private key is a single one. Unfortunately, some of the PKGs(private key manager) could be untrusty, such that they would leak lower level's private keys. In this paper, we propose a novel private key management scheme in HIBE, where a domain master key is not charged by a single one, but a group PKGs aiming at avoiding unreliable PKGs' attack.
引用
收藏
页码:206 / 212
页数:7
相关论文
共 50 条
  • [1] Generalized key delegation for hierarchical identity-based encryption
    Abdalla, Michel
    Kiltz, Eike
    Neven, Gregory
    [J]. COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 139 - 154
  • [2] Generalised key delegation for hierarchical identity-based encryption
    Abdalla, M.
    Kiltz, E.
    Neven, G.
    [J]. IET INFORMATION SECURITY, 2008, 2 (03) : 67 - 78
  • [3] A Hierarchical Key Management Scheme for Wireless Sensor Networks Based on Identity-based Encryption
    Hu, Shuaiqi
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2015, : 384 - 389
  • [4] Accountable identity-based encryption with distributed private key generators
    Zhao, Zhen
    Wu, Ge
    Susilo, Willy
    Guo, Fuchun
    Wang, Baocang
    Hu, Yupu
    [J]. INFORMATION SCIENCES, 2019, 505 : 352 - 366
  • [5] Hierarchical identity-based encryption without key delegation in decryption
    Luo, Song
    Chen, Zhong
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2014, 5 (02) : 71 - 79
  • [6] Hierarchical Identity-Based Encryption with Constant-Size Private Keys
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    [J]. ETRI JOURNAL, 2012, 34 (01) : 142 - 145
  • [7] Revocable hierarchical identity-based encryption
    Seo, Jae Hong
    Emura, Keita
    [J]. THEORETICAL COMPUTER SCIENCE, 2014, 542 : 44 - 62
  • [8] Key-Private Identity-Based Proxy Re-Encryption
    Ge, Chunpeng
    Xia, Jinyue
    Fang, Liming
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (02): : 633 - 647
  • [9] Toward hierarchical identity-based encryption
    Horwitz, J
    Lynn, B
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 466 - 481
  • [10] Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 242 - 257