Revocable hierarchical identity-based encryption

被引:19
|
作者
Seo, Jae Hong [1 ]
Emura, Keita [2 ]
机构
[1] Myongji Univ, Dept Math, Yongin 449728, South Korea
[2] Natl Inst Informat & Commun Technol NICT, Koganei, Tokyo 1848795, Japan
关键词
(Hierarchical) identity-based encryption; Revocation; Delegation; KEY-INSULATED ENCRYPTION; DUAL SYSTEM ENCRYPTION; HIBE; IBE;
D O I
10.1016/j.tcs.2014.04.031
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In practice, revocation functionality is indispensable to the public key cryptosystems since there are threats of leaking a secret key by hacking or legal situation of expiration of contract for using system. In the public key infrastructure setting, numerous solutions have been proposed, and in the Identity Based Encryption (IBE) setting, a recent series of papers proposed revocable IBE schemes. Delegation of key generation is also an important functionality in cryptography from a practical standpoint since it allows reduction of excessive workload for a single key generation authority. Although efficient solutions for either revocation or delegation of key generation in IBE systems have been proposed, an important open problem is efficiently delegating both the key generation and revocation functionalities in IBE systems. Even if the goal is very natural, there are some obstacles to achieve both functionalities at the same time. Libert and Vergnaud, for instance, left this as an open problem in their CT-RSA 2009 paper. In this paper, we propose the first efficient solution for this problem. We prove the selective-ID security of our proposal under the Decisional Bilinear Diffie-Hellman assumption in the standard model. (C) 2014 Elsevier BY. All rights reserved.
引用
收藏
页码:44 / 62
页数:19
相关论文
共 50 条
  • [1] Revocable Hierarchical Identity-Based Broadcast Encryption
    Dawei Li
    Jianwei Liu
    Zongyang Zhang
    Qianhong Wu
    Weiran Liu
    [J]. Tsinghua Science and Technology, 2018, 23 (05) : 539 - 549
  • [2] Revocable Hierarchical Identity-Based Broadcast Encryption
    Li, Dawei
    Liu, Jianwei
    Zhang, Zongyang
    Wu, Qianhong
    Liu, Weiran
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 539 - 549
  • [5] Simplified Revocable Hierarchical Identity-Based Encryption from Lattices
    Wang, Shixiong
    Zhang, Juanyang
    He, Jingnan
    Wang, Huaxiong
    Li, Chao
    [J]. CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 99 - 119
  • [6] A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption
    Lee, Kwangsu
    Kim, Joon Sik
    [J]. IEEE ACCESS, 2022, 10 : 44178 - 44199
  • [7] Mergeable and Revocable Identity-Based Encryption
    Xu, Shengmin
    Yang, Guomin
    Mu, Yi
    Susilo, Willy
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 : 147 - 167
  • [8] Efficient revocable hierarchical identity-based encryption using cryptographic accumulators
    Hongyong Jia
    Yue Chen
    Julong Lan
    Kaixiang Huang
    Jun Wang
    [J]. International Journal of Information Security, 2018, 17 : 477 - 490
  • [9] Efficient revocable hierarchical identity-based encryption using cryptographic accumulators
    Jia, Hongyong
    Chen, Yue
    Lan, Julong
    Huang, Kaixiang
    Wang, Jun
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (04) : 477 - 490
  • [10] Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption
    Seo, Jae Hong
    Emura, Keita
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 21 - 38