Private Key Management in Hierarchical Identity-Based Encryption

被引:0
|
作者
Liu, Zhongren [1 ]
Xu, Li [1 ]
Chen, Zhide [1 ]
Guo, Fuchun [1 ]
机构
[1] Fujian Normal Univ, Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
关键词
D O I
10.1109/SITIS.2007.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hierarchical Identity-Based Encryption (HIBE) is a generalization of IBE that mirrors an organizational hierarchy, which consists of a root private key generator (PKG), domain PKGs and users. In a traditional HIBE system, users retrieve private keys from their domain PKGs, while domain PKGs request domain secret keys from the root PKG. What's more, the manager of each private key is a single one. Unfortunately, some of the PKGs(private key manager) could be untrusty, such that they would leak lower level's private keys. In this paper, we propose a novel private key management scheme in HIBE, where a domain master key is not charged by a single one, but a group PKGs aiming at avoiding unreliable PKGs' attack.
引用
收藏
页码:206 / 212
页数:7
相关论文
共 50 条
  • [31] Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme
    Weng, Jian
    Chen, Min-Rong
    Chen, Kefei
    Deng, Robert H.
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (04) : 854 - 856
  • [32] A Scheme for Key Distribution in Wireless Sensor Network Based on Hierarchical Identity-Based Encryption
    Liu, Yan
    Wu, Xiumei
    Chen, Xuemin
    [J]. 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2015, : 539 - 543
  • [33] Key updating technique in identity-based encryption
    Liu, Shengli
    Long, Yu
    Chen, Kefei
    [J]. INFORMATION SCIENCES, 2011, 181 (11) : 2436 - 2440
  • [34] Identity Based Group Signatures from Hierarchical Identity-Based Encryption
    Smart, Nigel P.
    Warinschi, Bogdan
    [J]. PAIRING-BASED CRYPTOGRAPHY - PAIRING 2009, 2009, 5671 : 150 - 170
  • [35] Private Communication Based on Hierarchical Identity-Based Cryptography
    Kalyani, D.
    Sridevi, R.
    [J]. EMERGING TECHNOLOGIES IN DATA MINING AND INFORMATION SECURITY, IEMIS 2018, VOL 1, 2019, 755 : 749 - 756
  • [36] Hierarchical identity-based inner product functional encryption
    Song, Ge
    Deng, Yuqiao
    Huang, Qiong
    Peng, Changgen
    Tang, Chunming
    Wang, Xiaohua
    [J]. INFORMATION SCIENCES, 2021, 573 : 332 - 344
  • [37] A new Hierarchical identity-based encryption in the standard model
    Zhang, Le-You
    Hu, Yu-Pu
    Wu, Qing
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (04): : 937 - 941
  • [40] Timed-Release Hierarchical Identity-Based Encryption
    Oshikiri, Toru
    Saito, Taiichi
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (11) : 148 - 154