IRIBE: Intrusion-resilient identity-based encryption

被引:16
|
作者
Yu, Jia [1 ,2 ,3 ]
Hao, Rong [1 ]
Zhao, Huawei [4 ]
Shu, Minglei [2 ]
Fan, Jianxi [5 ]
机构
[1] Qingdao Univ, Coll Informat Engn, Qingdao 266071, Peoples R China
[2] Shandong Prov Key Lab Comp Network, Jinan 250014, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
[4] Qilu Univ Technol, Dept Internet Finance, Jinan 250100, Peoples R China
[5] Soochow Univ, Sch Comp Sci & Technol, Suzhou 215006, Peoples R China
基金
中国国家自然科学基金;
关键词
Key exposure; Identity-based encryption; Forward security; Intrusion-resilient identity-based encryption; Standard model; PUBLIC-KEY ENCRYPTION; GENERIC CONSTRUCTION; SECURITY;
D O I
10.1016/j.ins.2015.09.020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to limit the damage of key exposure for identity-based encryption, we propose a new paradigm called intrusion-resilient identity-based encryption (IRIBE) in this paper. Compared with key-insulated identity-based encryption and forward-secure identity-based encryption, IRIBE can achieve a stronger level of security. In our proposed scheme, the ciphertexts in any other time periods are secure even after arbitrarily many compromises of the base and the user, as long as compromises do not happen simultaneously. Furthermore, the intruder cannot decrypt the ciphertexts pertaining to previous time periods, even if it compromises the base and the user simultaneously. Therefore, our IRIBE scheme can greatly enhance the security of identity-based encryption. We also formalize the definition and the security notions of this paradigm. The proposed scheme is proven secure in the standard model. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:90 / 104
页数:15
相关论文
共 50 条
  • [1] Identity-based intrusion-resilient signature
    Li, Hongwei
    Sun, Shixin
    [J]. 2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 442 - 446
  • [2] Intrusion-resilient identity-based signature: Security definition and construction
    Yu, Jia
    Kong, Fanyu
    Cheng, Xiangguo
    Hao, Rong
    Fan, Jianxi
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (02) : 382 - 391
  • [3] Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction
    Yu, Jia
    Hao, Rong
    Xia, Hui
    Zhang, Hanlin
    Cheng, Xiangguo
    Kong, Fanyu
    [J]. INFORMATION SCIENCES, 2018, 442 : 158 - 172
  • [4] Intrusion-resilient public-key encryption
    Dodis, Y
    Franklin, M
    Katz, J
    Miyaji, A
    Yung, M
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2003, PROCEEDINGS, 2003, 2612 : 19 - 32
  • [5] A generic construction for intrusion-resilient public-key encryption
    Dodis, Y
    Franklin, M
    Katz, J
    Miyaji, A
    Yung, M
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 81 - 98
  • [6] Identity-based encryption resilient to continuous key leakage
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    Wang, Tao
    Wang, Xin
    [J]. IET INFORMATION SECURITY, 2019, 13 (05) : 426 - 434
  • [7] Identity-Based Encryption Resilient to Continual Auxiliary Leakage
    Yuen, Tsz Hon
    Chow, Sherman S. M.
    Zhang, Ye
    Yiu, Siu Ming
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 117 - 134
  • [8] Leakage-resilient identity-based encryption scheme
    Li, Sujuan
    Zhang, Futai
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 187 - 196
  • [9] k-resilient identity-based encryption in the standard model
    Heng, SH
    Kurosawa, K
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01) : 39 - 46
  • [10] k-resilient identity-based encryption in the standard model
    Heng, SH
    Kurosawa, K
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 67 - 80