Private Key Management in Hierarchical Identity-Based Encryption

被引:0
|
作者
Liu, Zhongren [1 ]
Xu, Li [1 ]
Chen, Zhide [1 ]
Guo, Fuchun [1 ]
机构
[1] Fujian Normal Univ, Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
关键词
D O I
10.1109/SITIS.2007.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hierarchical Identity-Based Encryption (HIBE) is a generalization of IBE that mirrors an organizational hierarchy, which consists of a root private key generator (PKG), domain PKGs and users. In a traditional HIBE system, users retrieve private keys from their domain PKGs, while domain PKGs request domain secret keys from the root PKG. What's more, the manager of each private key is a single one. Unfortunately, some of the PKGs(private key manager) could be untrusty, such that they would leak lower level's private keys. In this paper, we propose a novel private key management scheme in HIBE, where a domain master key is not charged by a single one, but a group PKGs aiming at avoiding unreliable PKGs' attack.
引用
收藏
页码:206 / 212
页数:7
相关论文
共 50 条
  • [21] Practical identity-based encryption in multiple private key generator (PKG) environments
    Wang, Shengbao
    Cao, Zhenfu
    Xie, Qi
    Liu, Wenhao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (01) : 43 - 50
  • [22] Identity-based hierarchical strongly key-insulated encryption and its application
    Hanaoka, Y
    Hanaoka, G
    Shikata, J
    Imai, H
    [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 495 - 514
  • [23] Revocable Hierarchical Identity-Based Broadcast Encryption
    Dawei Li
    Jianwei Liu
    Zongyang Zhang
    Qianhong Wu
    Weiran Liu
    [J]. Tsinghua Science and Technology, 2018, 23 (05) : 539 - 549
  • [24] Efficient identity-based encryption with Hierarchical key-insulation from HIBE
    Keita Emura
    Atsushi Takayasu
    Yohei Watanabe
    [J]. Designs, Codes and Cryptography, 2021, 89 : 2397 - 2431
  • [25] Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
    Watanabe, Yohei
    Shikata, Junji
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 2016, 9614 : 255 - 279
  • [26] Efficient identity-based encryption with Hierarchical key-insulation from HIBE
    Emura, Keita
    Takayasu, Atsushi
    Watanabe, Yohei
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (10) : 2397 - 2431
  • [27] Revocable Hierarchical Identity-Based Broadcast Encryption
    Li, Dawei
    Liu, Jianwei
    Zhang, Zongyang
    Wu, Qianhong
    Liu, Weiran
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 539 - 549
  • [28] Hierarchical Identity-Based Online/Offline Encryption
    Liu, Zhongren
    Xu, Li
    Chen, Zhide
    Mu, Yi
    Guo, Fuchun
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2115 - +
  • [29] A Scheme for Key Distribution in Wireless Sensor Network Based on Hierarchical Identity-Based Encryption
    Liu, Yan
    Wu, Xiumei
    Chen, Xuemin
    [J]. 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2015, : 539 - 543
  • [30] Tightly Secure Hierarchical Identity-Based Encryption
    Langrehr, Roman
    Pan, Jiaxin
    [J]. JOURNAL OF CRYPTOLOGY, 2020, 33 (04) : 1787 - 1821