Identity-based Encryption with Efficient Revocation

被引:0
|
作者
Boldyreva, Alexandra [1 ]
Goyal, Vipul
Kumar, Virendra [1 ]
机构
[1] Georgia Inst Technol, Sch Comp Sci, Atlanta, GA 30332 USA
关键词
Identity-based encryption; revocation; provable security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminates the need for a, Public Key Infrastructure (PKI). The senders using an IBE do not need to look up the public keys and the corresponding certificates of the receivers, the identities (e.g. emails or IP addresses) of the latter are sufficient to encrypt. Any setting, PKI- or identity-based, must, provide a means to revoke users from the system. Efficient, revocation is a, well-studied problem in the traditional PKI setting. However in the setting of IBE, there has been little work on studying the revocation mechanisms. The most practical solution requires the senders to also use time periods when encrypting, and all the receivers (regardless of whether their keys have been compromised or not) to update their private keys regularly by contacting Hie trusted authority. We note that, this solution does not scale well - as the number of users increases, the work on key updates becomes a bottleneck. We propose an IBE, scheme that significantly improves key-update efficiency on the side of the trusted party (from linear to logarithmic in the number of users), while staying efficient for the users. Our scheme builds on the ideas of the Fuzzy IBE primitive and binary tree data structure, and is provably secure.
引用
收藏
页码:417 / 426
页数:10
相关论文
共 50 条
  • [1] Efficient Identity-Based Encryption With Revocation for Data Privacy in Internet of Things
    Sun, Yinxia
    Chatterjee, Pushpita
    Chen, Yi
    Zhang, Yudong
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) : 2734 - 2743
  • [2] Identity-Based Encryption with Verifiable Outsourced Revocation
    Ren, Yanli
    Ding, Ning
    Zhang, Xinpeng
    Lu, Haining
    Gu, Dawu
    [J]. COMPUTER JOURNAL, 2016, 59 (11): : 1659 - 1668
  • [3] Identity-Based Encryption with Outsourced Revocation in Cloud Computing
    Li, Jin
    Li, Jingwei
    Chen, Xiaofeng
    Jia, Chunfu
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (02) : 425 - 437
  • [4] Identity-Based Encryption with Cloud Revocation Authority and Its Applications
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    Huang, Sen-Shan
    Huang, Chung-Peng
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (04) : 1041 - 1053
  • [5] Efficient biometric identity-based encryption
    Li, Xiaoguo
    Xiang, Tao
    Chen, Fei
    Guo, Shangwei
    [J]. INFORMATION SCIENCES, 2018, 465 : 248 - 264
  • [6] How to solve key escrow and identity revocation in identity-based encryption schemes
    Oh, J
    Lee, K
    Moon, S
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 290 - 303
  • [7] Identity-based encryption and hierarchical identity-based encryption
    University of Waterloo, Canada
    不详
    [J]. Cryptology Inf. Secur. Ser., 2009, (45-64):
  • [8] Efficient Identity-Based Encryption from LWR
    Cheon, Jung Hee
    Cho, Haejin
    Jung, Jaewook
    Lee, Joohee
    Lee, Keewoo
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 225 - 241
  • [9] Efficient Identity-based Encryption from Lattice
    Chen, Huiyan
    Chen, Dongmei
    Zhang, Yanshuo
    [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CLOUD COMPUTING COMPANION (ISCC-C), 2014, : 84 - 90
  • [10] Forward-secure identity-based signature with efficient revocation
    Wei, Jianghong
    Liu, Wenfen
    Hu, Xuexian
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2017, 94 (07) : 1390 - 1411