Revocation Systems with Very Small Private Keys

被引:149
|
作者
Lewko, Allison [1 ]
Sahai, Amit [2 ]
Waters, Brent [1 ,3 ]
机构
[1] Univ Texas Austin, Austin, TX 78712 USA
[2] UCLA, Los Angeles, CA USA
[3] Univ Texas Austin, Austin, TX 78712 USA
基金
美国国家科学基金会;
关键词
IDENTITY-BASED ENCRYPTION; SECURITY;
D O I
10.1109/SP.2010.23
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new "two equation" technique for revoking users. This technique results in two key contributions: First, our new scheme has ciphertext size overhead O(r), where r is the number of revoked users, and the size of public and private keys is only a constant number of group elements from an elliptic-curve group of prime order. In addition, the public key allows us to encrypt to an unbounded number of users. Our system is the first to achieve such parameters. We give two versions of our scheme: a simpler version which we prove to be selectively secure in the standard model under a new, but non-interactive assumption, and another version that employs the new dual system encryption technique of Waters to obtain adaptive security under the d-BDH and decisional Linear assumptions. Second, we show that our techniques can be used to realize Attribute-Based Encryption (ABE) systems with non-monotonic access formulas, where our key storage is significantly more efficient than previous solutions. This result is also proven selectively secure in the standard model under our new non-interactive assumption.
引用
收藏
页码:273 / 285
页数:13
相关论文
共 50 条
  • [1] Revocation of TPM Keys
    Katzenbeisser, Stefan
    Kursawe, Klaus
    Stumpf, Frederic
    [J]. TRUSTED COMPUTING, PROCEEDINGS, 2009, 5471 : 120 - +
  • [2] Key Life Cycle and Estimation of Time for Revocation of Keys in Cryptographic Systems
    Pal, Om
    Alam, Bashir
    [J]. PROCEEDINGS OF ICETIT 2019: EMERGING TRENDS IN INFORMATION TECHNOLOGY, 2020, 605 : 1028 - 1038
  • [3] On the distribution and revocation of cryptographic keys in sensor networks
    Chan, HW
    Gligor, VD
    Perrig, A
    Muralidharan, G
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (03) : 233 - 247
  • [4] RETROACTIVE REVOCATION OF PRIVATE RULING
    不详
    [J]. JOURNAL OF TAXATION, 1986, 65 (01): : 54 - 54
  • [5] Forecasting the liquidity of very small private companies
    Mramor, D
    Valentincic, A
    [J]. JOURNAL OF BUSINESS VENTURING, 2003, 18 (06) : 745 - 771
  • [6] Batch Private Keys Generation for RSA in Security Communication Systems
    陈运
    陈新
    [J]. Journal of Electronic Science and Technology, 2005, (01) : 22 - 26
  • [7] Expiration and Revocation of Keys for Attribute-Based Signatures
    Tate, Stephen R.
    Vishwanathan, Roopa
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX, 2015, 9149 : 153 - 169
  • [8] An evaluation of the RSA private keys and the presence of weak keys
    Almazari, Mahmoud M.
    Taqieddin, Eyad
    Shatnawi, Ahmed S.
    Al-Shara, Zakarea
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (08): : 2273 - 2284
  • [9] STABILITY OF SYSTEMS WITH MULTIPLE VERY SMALL AND VERY LARGE PARASITICS
    ABED, EH
    SILVAMADRIZ, RI
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS, 1987, 34 (09): : 1107 - 1110
  • [10] On the Existence of Multiple RSA Private Keys
    Wu, Chuan-Kun
    Zhao, Bin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022