An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme

被引:4
|
作者
Wang, Changji [1 ,2 ]
Li, Yuan [1 ,2 ]
Xia, Xiaonan [1 ,2 ]
Zheng, Kangjia [1 ,2 ]
机构
[1] Sun Yat Sen Univ, Sch Informat Sci & Technol, Guangzhou 510275, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Guangdong Prov Informat Secur Key Lab, Guangzhou 510275, Guangdong, Peoples R China
来源
PLOS ONE | 2014年 / 9卷 / 09期
基金
中国国家自然科学基金;
关键词
DUAL SYSTEM ENCRYPTION; HIBE; IBE;
D O I
10.1371/journal.pone.0106925
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE) has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either insecure or inefficient. In this paper, we propose a new scalable RIBE scheme with decryption key exposure resilience by combining Lewko and Waters' identity-based encryption scheme and complete subtree method, and prove our RIBE scheme to be semantically secure using dual system encryption methodology. Compared to existing scalable and semantically secure RIBE schemes, our proposed RIBE scheme is more efficient in term of ciphertext size, public parameters size and decryption cost at price of a little looser security reduction. To the best of our knowledge, this is the first construction of scalable and semantically secure RIBE scheme with constant size public system parameters.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] An Efficient Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Jiang, Shengyi
    Wu, Jiayuan
    [J]. SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 506 - 515
  • [2] An efficient and provable secure identity-based ring signcryption scheme
    Zhu, ZhenChao
    Zhang, Yuqing
    Wang, Fengjiao
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1092 - 1097
  • [3] An efficient and full secure identity-based encryption scheme
    Ma, Rong
    Cao, Zhen-Fu
    [J]. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2010, 44 (03): : 389 - 392
  • [4] Forward-Secure Revocable Identity-Based Encryption
    Qin, Baodong
    Bai, Xue
    Zheng, Dong
    Cui, Hui
    Luo, Yiyuan
    [J]. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT II, 2021, 12919 : 321 - 340
  • [5] An efficient and provable secure identity-based identification scheme in the standard model
    Chin, Ji-Jian
    Heng, Swee-Huay
    Coi, Bok-Min
    [J]. PUBLIC KEY INFRASTRUCTURE, 2008, 5057 : 60 - +
  • [6] A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage
    Luo, Wei
    Ma, Wenping
    [J]. CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 519 - 530
  • [7] Constructions of CCA-Secure Revocable Identity-Based Encryption
    Ishida, Yuu
    Watanabe, Yohei
    Shikata, Junji
    [J]. INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 174 - 191
  • [8] Adaptive-ID Secure Revocable Identity-Based Encryption
    Libert, Benoit
    Vergnaud, Damien
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 1 - +
  • [9] An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model
    Tan, Syh-Yuan
    Chin, Ji-Jian
    Heng, Swee-Huay
    Goi, Bok-Min
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (04): : 910 - 922
  • [10] An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme
    Chin, Ji-Jian
    Behnia, Rouzbeh
    Heng, Swee-Huay
    Phan, Raphael C. -W.
    [J]. 2013 EIGHTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2013, : 27 - 32