Identity-based hierarchical strongly key-insulated encryption and its application

被引:0
|
作者
Hanaoka, Y [1 ]
Hanaoka, G
Shikata, J
Imai, H
机构
[1] NTT DoCoMo Inc, Yokosuka, Kanagawa, Japan
[2] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama, Kanagawa 240, Japan
[3] Univ Tokyo, Inst Ind Sci, Tokyo, Japan
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). In practice, key revocation is a necessary and inevitable process and IBE is no exception when it comes to having to manage revocation of decryption keys without losing its merits in efficiency. Our main contribution of this paper is to propose novel constructions of IBE where a decryption key can be renewed without having to make changes to its public key, i.e. user's identity. We achieve this by extending the hierarchical IBE (HIBE). Regarding security, we address semantic security against adaptive chosen ciphertext attacks for a very strong attack environment that models all possible types of key exposures in the random oracle model. In addition to this, we show method of constructing a partially collusion resistant HIBE from arbitrary IBE in the random oracle model. By combining both results, we can construct an IBE with non-interactive key update from only an arbitrary IBE.
引用
收藏
页码:495 / 514
页数:20
相关论文
共 50 条
  • [1] Improved Hierarchical Identity-Based Parallel Key-Insulated Encryption
    Ren, Yanli
    Wang, Shuozhong
    Zhang, Xinpeng
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (04): : 647 - 658
  • [2] Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
    Watanabe, Yohei
    Shikata, Junji
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 2016, 9614 : 255 - 279
  • [3] Identity-Based Key-Insulated Signcryption
    Chen, Jianhong
    Chen, Kefei
    Wang, Yongtao
    Li, Xiangxue
    Long, Yu
    Wan, Zhongmei
    [J]. INFORMATICA, 2012, 23 (01) : 27 - 45
  • [4] A NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME
    Lin, Han-Yu
    Hsu, Chien-Lung
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (03) : 739 - 756
  • [5] Identity-based threshold key-insulated encryption without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Zheng, Dong
    Qiu, Weidong
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 203 - +
  • [6] Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme
    Wang, Xu An
    Weng, Jian
    Yang, Xiaoyuan
    Zhang, Minqing
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (02) : 219 - 225
  • [7] IDENTITY-BASED KEY-INSULATED PROXY SIGNATURE
    Wan Zhongmei Lai Xuejia Weng Jian Liu Shengli Hong Xuan (Department of Computer Science and Engineering
    [J]. Journal of Electronics(China), 2009, 26 (06) : 853 - 858
  • [8] An Improvement of an Identity-Based Key-insulated Signcryption
    Zhu, Guobin
    Xiong, Hu
    Wang, Ruijin
    Qin, Zhiguang
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 97 - 104
  • [9] CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles
    Ren, Yanli
    Gu, Dawu
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (01) : 153 - 162
  • [10] New identity-based key-insulated convertible multi-authenticated encryption scheme
    Hsu, Chien-Lung
    Lin, Han-Yu
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (05) : 1724 - 1731