Revocable Identity-Based Encryption with Rejoin Functionality

被引:6
|
作者
Seo, Jae Hong [1 ]
Emura, Keita [2 ]
机构
[1] Myongji Univ, Dept Math, Yongin 449728, Gyeonggi Do, South Korea
[2] Natl Inst Informat & Commun Technol NICT, Network Secur Res Inst, Koganei, Tokyo 1848795, Japan
关键词
Revocable Identity-Based Encryption; scalability; rejoin functionality;
D O I
10.1587/trnasfun.E97.A.1806
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the Identity-Based Encryption (B3E) setting, the rejoin functionality seems to be impossible since each user has the unique identity as its public key. Moreover, sometimes these identities are unchangeable, e.g., biological information (finger print iris, and so on) is regarded as the identity. Even if changeable value is indicated as an identity, e.g., e-mail address, it is preferable that the same identity can be used after a secret key is leaked. In this paper, we give a formal security definition of MEE with the rejoin functionality, and also show that the Seo-Emura RISE scheme [PKC 2013] (with a slight modification) has the rejoin functionality.
引用
收藏
页码:1806 / 1809
页数:4
相关论文
共 50 条
  • [1] Revocable hierarchical identity-based encryption
    Seo, Jae Hong
    Emura, Keita
    THEORETICAL COMPUTER SCIENCE, 2014, 542 : 44 - 62
  • [2] Mergeable and Revocable Identity-Based Encryption
    Xu, Shengmin
    Yang, Guomin
    Mu, Yi
    Susilo, Willy
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 : 147 - 167
  • [3] Revocable Hierarchical Identity-Based Broadcast Encryption
    Dawei Li
    Jianwei Liu
    Zongyang Zhang
    Qianhong Wu
    Weiran Liu
    TsinghuaScienceandTechnology, 2018, 23 (05) : 539 - 549
  • [4] Revocable Hierarchical Identity-Based Broadcast Encryption
    Li, Dawei
    Liu, Jianwei
    Zhang, Zongyang
    Wu, Qianhong
    Liu, Weiran
    TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 539 - 549
  • [5] Forward-Secure Revocable Identity-Based Encryption
    Qin, Baodong
    Bai, Xue
    Zheng, Dong
    Cui, Hui
    Luo, Yiyuan
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT II, 2021, 12919 : 321 - 340
  • [6] Server-Aided Revocable Identity-Based Encryption
    Qin, Baodong
    Deng, Robert H.
    Li, Yingjiu
    Liu, Shengli
    COMPUTER SECURITY - ESORICS 2015, PT I, 2015, 9326 : 286 - 304
  • [9] Revocable identity-based matchmaking encryption in the standard model
    Jiang, Zhe
    Wang, Xiwen
    Zhang, Kai
    Gong, Junqing
    Chen, Jie
    Qian, Haifeng
    IET INFORMATION SECURITY, 2023, 17 (04) : 567 - 581
  • [10] Outsourced revocable identity-based encryption from lattices
    Dong, Chengcheng
    Yang, Kang
    Qiu, Jian
    Chen, Yuanfang
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (11):