Revocable Identity-Based Encryption with Rejoin Functionality

被引:6
|
作者
Seo, Jae Hong [1 ]
Emura, Keita [2 ]
机构
[1] Myongji Univ, Dept Math, Yongin 449728, Gyeonggi Do, South Korea
[2] Natl Inst Informat & Commun Technol NICT, Network Secur Res Inst, Koganei, Tokyo 1848795, Japan
关键词
Revocable Identity-Based Encryption; scalability; rejoin functionality;
D O I
10.1587/trnasfun.E97.A.1806
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the Identity-Based Encryption (B3E) setting, the rejoin functionality seems to be impossible since each user has the unique identity as its public key. Moreover, sometimes these identities are unchangeable, e.g., biological information (finger print iris, and so on) is regarded as the identity. Even if changeable value is indicated as an identity, e.g., e-mail address, it is preferable that the same identity can be used after a secret key is leaked. In this paper, we give a formal security definition of MEE with the rejoin functionality, and also show that the Seo-Emura RISE scheme [PKC 2013] (with a slight modification) has the rejoin functionality.
引用
收藏
页码:1806 / 1809
页数:4
相关论文
共 50 条
  • [31] A generic construction for revocable identity-based encryption with subset difference methods
    Lee, Kwangsu
    PLOS ONE, 2020, 15 (09):
  • [32] Efficient revocable identity-based encryption via subset difference methods
    Lee, Kwangsu
    Lee, Dong Hoon
    Park, Jong Hwan
    DESIGNS CODES AND CRYPTOGRAPHY, 2017, 85 (01) : 39 - 76
  • [33] Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption
    Seo, Jae Hong
    Emura, Keita
    ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 21 - 38
  • [34] Identity-based encryption and hierarchical identity-based encryption
    University of Waterloo, Canada
    不详
    Cryptology Inf. Secur. Ser., 2009, (45-64):
  • [35] CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud
    Sun, Yinxia
    Susilo, Willy
    Zhang, Futai
    Fu, Anmin
    IEEE ACCESS, 2018, 6 : 56977 - 56983
  • [36] Revocable Identity-Based Encryption Scheme Under LWE Assumption the Standard Model
    Zhang, Yaling
    Wang, Shangping
    Du, Qing
    IEEE ACCESS, 2018, 6 : 65298 - 65307
  • [37] Revocable hierarchical identity-based encryption with shorter private keys and update keys
    Lee, Kwangsu
    Park, Seunghwan
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (10) : 2407 - 2440
  • [38] Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID Security
    Xing, Qianqian
    Wang, Baosheng
    Wang, Xiaofeng
    Chen, Peixin
    Yu, Bo
    Tang, Yong
    Gao, Xianming
    PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, : 430 - 437
  • [39] Revocable hierarchical identity-based encryption with shorter private keys and update keys
    Kwangsu Lee
    Seunghwan Park
    Designs, Codes and Cryptography, 2018, 86 : 2407 - 2440
  • [40] Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption
    Saravanakumar, S.
    Chitra, S.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (03): : 985 - 996