Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID Security

被引:0
|
作者
Xing, Qianqian [1 ]
Wang, Baosheng [1 ]
Wang, Xiaofeng [1 ]
Chen, Peixin [1 ]
Yu, Bo [1 ]
Tang, Yong [1 ]
Gao, Xianming [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha, Hunan, Peoples R China
关键词
Hierarchical identity-based encryption; Key revocation; Unbounded hierarchical depths; Adaptive-ID security; Nested Dual system encryption; Bilinear maps;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Revocable hierarchical identity-based encryption (RHIBE) is a good candidate encryption for secure wireless communications. Its dynamic user management through the hierarchical key generation and revocation is efficient. Most existing RHIBEs are bounded which have to fix the maximum hierarchical depth of users at setup. In this paper, we propose the first unbounded and adaptively-ID secure RHIBE called URHIBE. Firstly, we design U-RHIBE extended from one unbounded HIBE scheme. The size of every secret key in our URHIBE is only linear with the hierarchical depth and the size of our public parameter is constant. Secondly, we design the first nested dual system encryption framework exclusively for the proof of the security of unbounded and revocable HIBE schemes. Our system model is scalable inherently to accommodate more levels of user adaptively with no adding workload or restarting the system. With a little increase of decryption cost comparing with Ryu's scheme, U-RHIBE firstly covers properties of adaptive-ID security, unbounded key delegation, efficient revocation, history-free key update, key exposure resistance and security against insiders.
引用
收藏
页码:430 / 437
页数:8
相关论文
共 50 条
  • [1] Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption
    Seo, Jae Hong
    Emura, Keita
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 21 - 38
  • [2] Adaptive-ID Secure Revocable Identity-Based Encryption
    Libert, Benoit
    Vergnaud, Damien
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 1 - +
  • [3] An Efficient Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Jiang, Shengyi
    Wu, Jiayuan
    [J]. SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 506 - 515
  • [6] Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method
    Cheng, Shantian
    Zhang, Juanyang
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 283 - 297
  • [7] Revocable hierarchical identity-based encryption
    Seo, Jae Hong
    Emura, Keita
    [J]. THEORETICAL COMPUTER SCIENCE, 2014, 542 : 44 - 62
  • [8] Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters
    Xing, Qianqian
    Wang, Baosheng
    Wang, Xiaofeng
    Tao, Jing
    [J]. PLOS ONE, 2018, 13 (04):
  • [9] Revocable Hierarchical Identity-Based Broadcast Encryption
    Dawei Li
    Jianwei Liu
    Zongyang Zhang
    Qianhong Wu
    Weiran Liu
    [J]. Tsinghua Science and Technology, 2018, 23 (05) : 539 - 549
  • [10] Revocable Hierarchical Identity-Based Broadcast Encryption
    Li, Dawei
    Liu, Jianwei
    Zhang, Zongyang
    Wu, Qianhong
    Liu, Weiran
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 539 - 549