Revocable Identity-Based Encryption with Rejoin Functionality

被引:6
|
作者
Seo, Jae Hong [1 ]
Emura, Keita [2 ]
机构
[1] Myongji Univ, Dept Math, Yongin 449728, Gyeonggi Do, South Korea
[2] Natl Inst Informat & Commun Technol NICT, Network Secur Res Inst, Koganei, Tokyo 1848795, Japan
关键词
Revocable Identity-Based Encryption; scalability; rejoin functionality;
D O I
10.1587/trnasfun.E97.A.1806
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the Identity-Based Encryption (B3E) setting, the rejoin functionality seems to be impossible since each user has the unique identity as its public key. Moreover, sometimes these identities are unchangeable, e.g., biological information (finger print iris, and so on) is regarded as the identity. Even if changeable value is indicated as an identity, e.g., e-mail address, it is preferable that the same identity can be used after a secret key is leaked. In this paper, we give a formal security definition of MEE with the rejoin functionality, and also show that the Seo-Emura RISE scheme [PKC 2013] (with a slight modification) has the rejoin functionality.
引用
收藏
页码:1806 / 1809
页数:4
相关论文
共 50 条
  • [21] Revocable Identity-Based Encryption Revisited: Security Model and Construction
    Seo, Jae Hong
    Emura, Keita
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 216 - 234
  • [22] Revocable Identity-Based Encryption with Decryption Key Exposure Resistance
    Wang, Xiaoyi
    Chen, Hu
    Zhao, Jiangdong
    Computer Engineering and Applications, 2024, 60 (19) : 268 - 277
  • [23] Adaptive-ID Secure Revocable Identity-Based Encryption
    Libert, Benoit
    Vergnaud, Damien
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 1 - +
  • [24] Efficient revocable identity-based encryption with short public parameters
    Emura, Keita
    Seo, Jae Hong
    Watanabe, Yohei
    THEORETICAL COMPUTER SCIENCE, 2021, 863 : 127 - 155
  • [25] Revocable identity-based encryption with server-aided ciphertext evolution
    Sun, Yinxia
    Mu, Yi
    Susilo, Willy
    Zhang, Futai
    Fu, Anmin
    THEORETICAL COMPUTER SCIENCE, 2020, 815 : 11 - 24
  • [26] New Constructions of Revocable Identity-Based Encryption From Multilinear Maps
    Park, Seunghwan
    Lee, Kwangsu
    Lee, Dong Hoon
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (08) : 1564 - 1577
  • [27] Efficient revocable hierarchical identity-based encryption using cryptographic accumulators
    Hongyong Jia
    Yue Chen
    Julong Lan
    Kaixiang Huang
    Jun Wang
    International Journal of Information Security, 2018, 17 : 477 - 490
  • [28] Efficient revocable identity-based encryption via subset difference methods
    Kwangsu Lee
    Dong Hoon Lee
    Jong Hwan Park
    Designs, Codes and Cryptography, 2017, 85 : 39 - 76
  • [29] Server-Aided Revocable Identity-Based Encryption from Lattices
    Khoa Nguyen
    Wang, Huaxiong
    Zhang, Juanyang
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 107 - 123
  • [30] Efficient revocable hierarchical identity-based encryption using cryptographic accumulators
    Jia, Hongyong
    Chen, Yue
    Lan, Julong
    Huang, Kaixiang
    Wang, Jun
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (04) : 477 - 490