Identity-Based Encryption with Outsourced Revocation in Cloud Computing

被引:288
|
作者
Li, Jin [1 ,2 ]
Li, Jingwei [3 ]
Chen, Xiaofeng [2 ]
Jia, Chunfu [3 ]
Lou, Wenjing [4 ]
机构
[1] Guangzhou Univ, Sch Comp Sci, Guangzhou 510500, Guangdong, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 700071, Peoples R China
[3] Nankai Univ, Coll Informat Tech Sci, Tianjin 300071, Peoples R China
[4] Virginia Polytech Inst & State Univ, Blacksburg, VA 22043 USA
基金
美国国家科学基金会; 国家教育部博士点专项基金资助; 中国国家自然科学基金;
关键词
Identity-based encryption (IBE); revocation; outsourcing; cloud computing; SECURE;
D O I
10.1109/TC.2013.208
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-Based Encryption (IBE) which simplifies the public key and certificate management at Public Key Infrastructure (PKI) is an important alternative to public key encryption. However, one of the main efficiency drawbacks of IBE is the overhead computation at Private Key Generator (PKG) during user revocation. Efficient revocation has been well studied in traditional PKI setting, but the cumbersome management of certificates is precisely the burden that IBE strives to alleviate. In this paper, aiming at tackling the critical issue of identity revocation, we introduce outsourcing computation into IBE for the first time and propose a revocable IBE scheme in the server-aided setting. Our scheme offloads most of the key generation related operations during key-issuing and key-update processes to a Key Update Cloud Service Provider, leaving only a constant number of simple operations for PKG and users to perform locally. This goal is achieved by utilizing a novel collusion-resistant technique: we employ a hybrid private key for each user, in which an AND gate is involved to connect and bound the identity component and the time component. Furthermore, we propose another construction which is provable secure under the recently formulized Refereed Delegation of Computation model. Finally, we provide extensive experimental results to demonstrate the efficiency of our proposed construction.
引用
收藏
页码:425 / 437
页数:13
相关论文
共 50 条
  • [1] Identity-Based Encryption with Verifiable Outsourced Revocation
    Ren, Yanli
    Ding, Ning
    Zhang, Xinpeng
    Lu, Haining
    Gu, Dawu
    [J]. COMPUTER JOURNAL, 2016, 59 (11): : 1659 - 1668
  • [2] Identity-based encryption with outsourced equality test in cloud computing
    Ma, Sha
    [J]. INFORMATION SCIENCES, 2016, 328 : 389 - 402
  • [3] Identity-Based Encryption with Cloud Revocation Authority and Its Applications
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    Huang, Sen-Shan
    Huang, Chung-Peng
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (04) : 1041 - 1053
  • [4] Identity-based Encryption with Efficient Revocation
    Boldyreva, Alexandra
    Goyal, Vipul
    Kumar, Virendra
    [J]. CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 417 - 426
  • [5] An Efficient Identity-Based Encryption With Equality Test in Cloud Computing
    Yang, Zhichao
    He, Debiao
    Qu, Longjiang
    Ye, Qing
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 2983 - 2992
  • [6] Outsourced revocable identity-based encryption from lattices
    Dong, Chengcheng
    Yang, Kang
    Qiu, Jian
    Chen, Yuanfang
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (11):
  • [7] Efficient Revocation on Identity based Encryption with Public Key Infrastructure in Cloud Computing
    Sale, Nitin
    Talhar, Nitin
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [8] Escrow-Less Identity-Based Signature Scheme with Outsourced Protection in Cloud Computing
    Mahender Kumar
    Satish Chand
    [J]. Wireless Personal Communications, 2020, 114 : 3115 - 3136
  • [9] Escrow-Less Identity-Based Signature Scheme with Outsourced Protection in Cloud Computing
    Kumar, Mahender
    Chand, Satish
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (04) : 3115 - 3136
  • [10] Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing
    Kim, Jongkil
    Camtepe, Seyit
    Susilo, Willy
    Nepal, Surya
    Baek, Joonsang
    [J]. PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 55 - 66