Forward-Secure Revocable Identity-Based Encryption

被引:3
|
作者
Qin, Baodong [1 ,2 ,3 ]
Bai, Xue [1 ]
Zheng, Dong [1 ,4 ]
Cui, Hui [5 ]
Luo, Yiyuan [6 ,7 ,8 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Cyberspace Secur, Xian 710121, Peoples R China
[2] Sci & Technol Commun Secur Lab, Chengdu 610041, Peoples R China
[3] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
[4] Westone Cryptol Res Ctr, Beijing, Peoples R China
[5] Murdoch Univ, Coll Arts Business Law & Social Sci, Discipline IT, Murdoch, WA 6150, Australia
[6] Huizhou Univ, Sch Comp Sci & Engn, Huizhou 516007, Peoples R China
[7] Henan Key Lab Network Cryptog Technol, Zhengzhou, Peoples R China
[8] Univ Elect Sci & Technol China, Network & Data Secur Key Lab Sichuan Prov, Chengdu, Peoples R China
基金
上海市自然科学基金; 中国国家自然科学基金;
关键词
Identity-based encryption; Revocation; Forward security; Decryption key exposure; SIGNATURE;
D O I
10.1007/978-3-030-88052-1_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For identity-based encryption (IBE), if a user's private key is compromised, the security of his/her ciphertexts will fail completely. Revocation capability provides an effective way to mitigate above harm, so that the adversary cannot access to future ciphertexts anymore. However, current revocable IBE schemes do not provide any means to guarantee the security of the user's previous ciphertexts. In this paper, we propose a new cryptographic primitive, namely forward-secure revocable identity-based encryption (FS-RIBE), to address this issue. In FS-RIBE, when the event of full exposure of the user's current private key occurs, the forward security can guarantee that the user's private keys prior to this remain secure, while the revocation capability further guarantees that the adversary cannot obtain any valid decryption keys for future times. We provide formal definition and security model for FS-RIBE, and give a generic construction that is secure under the security model from (Hierarchical) IBE. Finally, we show some results of instantiations from various IBE and Hierarchical IBE schemes.
引用
收藏
页码:321 / 340
页数:20
相关论文
共 50 条
  • [1] Forward-secure identity-based encryption scheme
    Yang, Hao-Miao
    Sun, Shi-Xin
    Li, Hong-Wei
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (03): : 534 - 537
  • [2] Generic Construction of Forward-Secure Identity-Based Encryption
    Lu, Yang
    Li, Jiguo
    [J]. JOURNAL OF COMPUTERS, 2012, 7 (12) : 3068 - 3074
  • [3] Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption
    Lu, Yang
    Li, Jiguo
    [J]. 2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 199 - 202
  • [4] Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails
    Wei, Jianghong
    Chen, Xiaofeng
    Wang, Jianfeng
    Hu, Xuexian
    Ma, Jianfeng
    [J]. COMPUTER SECURITY - ESORICS 2019, PT II, 2019, 11736 : 134 - 150
  • [5] Efficient Forward-Secure Identity-Based Encryption Scheme in the Standard Model
    Lu, Yang
    [J]. THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE, 2011, 164 : 62 - 69
  • [6] Generic Construction of Forward-Secure Revocable Identity-Based Signature and Lattice-Based Instantiations
    He, Yan
    Qin, Baodong
    Gao, Wen
    Zheng, Dong
    Zhao, Qianqian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [7] Forward-Secure Identity-Based Public-Key Encryption without Random Oracles
    Yu, Jia
    Cheng, Xiangguo
    Hao, Rong
    Kong, Fanyu
    Fan, Jianxi
    [J]. FUNDAMENTA INFORMATICAE, 2011, 111 (02) : 241 - 256
  • [8] Forward-Secure Data Outsourcing Based on Revocable Attribute-Based Encryption
    Hoang, Van-Hoan
    Lehtihet, Elyes
    Ghamri-Doudane, Yacine
    [J]. 2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1839 - 1846
  • [9] Forward-secure identity-based signature with efficient revocation
    Wei, Jianghong
    Liu, Wenfen
    Hu, Xuexian
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2017, 94 (07) : 1390 - 1411
  • [10] Constructions of CCA-Secure Revocable Identity-Based Encryption
    Ishida, Yuu
    Watanabe, Yohei
    Shikata, Junji
    [J]. INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 174 - 191