Revocable Identity-Based Encryption with Rejoin Functionality

被引:6
|
作者
Seo, Jae Hong [1 ]
Emura, Keita [2 ]
机构
[1] Myongji Univ, Dept Math, Yongin 449728, Gyeonggi Do, South Korea
[2] Natl Inst Informat & Commun Technol NICT, Network Secur Res Inst, Koganei, Tokyo 1848795, Japan
关键词
Revocable Identity-Based Encryption; scalability; rejoin functionality;
D O I
10.1587/trnasfun.E97.A.1806
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the Identity-Based Encryption (B3E) setting, the rejoin functionality seems to be impossible since each user has the unique identity as its public key. Moreover, sometimes these identities are unchangeable, e.g., biological information (finger print iris, and so on) is regarded as the identity. Even if changeable value is indicated as an identity, e.g., e-mail address, it is preferable that the same identity can be used after a secret key is leaked. In this paper, we give a formal security definition of MEE with the rejoin functionality, and also show that the Seo-Emura RISE scheme [PKC 2013] (with a slight modification) has the rejoin functionality.
引用
收藏
页码:1806 / 1809
页数:4
相关论文
共 50 条
  • [41] Simplified Server-Aided Revocable Identity-Based Encryption from Lattices
    Zhang, Yanhua
    Liu, Ximeng
    Hu, Yupu
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 : 71 - 87
  • [42] Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem
    Hu, Ziyuan
    Liu, Shengli
    Chen, Kefei
    Liu, Joseph K.
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 265 - 283
  • [43] Revocable hierarchical identity-based encryption via history-free approach
    Seo, Jae Hong
    Emura, Keita
    THEORETICAL COMPUTER SCIENCE, 2016, 615 : 45 - 60
  • [44] Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability
    Wang, Xiaolei
    Wang, Yang
    Wang, Mingqiang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 535 - 544
  • [45] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [46] Security of Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme
    Park, Seunghwan
    Lee, Dong Hoon
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (07): : 1933 - 1936
  • [47] An Efficient Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Jiang, Shengyi
    Wu, Jiayuan
    SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 506 - 515
  • [48] Deja Q Encore RIBE: Anonymous Revocable Identity-based Encryption with Short Parameters
    Xing, Qianqian
    Wang, Baosheng
    Wang, Xiaofeng
    Tang, Yong
    Wang, Yi
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [49] An efficient revocable identity-based encryption with ciphertext evolution in the cloud-assisted system
    Chen, Zhiwei
    Deng, Lunzhi
    Ruan, Yu
    Feng, Shuai
    Wang, Tao
    Wang, Bo
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (22):
  • [50] An Improved Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme
    Wang, Changji
    Fang, Jian
    Li, Yuan
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 14 - 26