Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption Key Exposure Resistance

被引:32
|
作者
Takayasu, Atsushi [1 ,3 ]
Watanabe, Yohei [2 ,3 ]
机构
[1] Univ Tokyo, Tokyo, Japan
[2] Univ Electrocommun, Tokyo, Japan
[3] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
关键词
TRAPDOORS;
D O I
10.1007/978-3-319-60055-0_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A revocable identity-based encryption (RIBE) scheme, proposed by Boldyreva et al., provides a revocation functionality for managing a number of users dynamically and efficiently. To capture a realistic scenario, Seo and Emura introduced an additional important security notion, called decryption key exposure resistance (DKER), where an adversary is allowed to query short-term decryption keys. Although several RIBE schemes that satisfy DKER have been proposed, all the lattice-based RIBE schemes, e.g., Chen et al.' s scheme, do not achieve DKER, since they basically do not have the key re-randomization property, which is considered to be an essential requirement for achieving DKER. In particular, in every existing lattice-based RIBE scheme, an adversary can easily recover plaintexts if the adversary is allowed to issue even a single short-term decryption key query. In this paper, we propose a new lattice-based RIBE scheme secure against exposure of a-priori bounded number of decryption keys (for every identity). We believe that this bounded notion is still meaningful and useful from a practical perspective. Technically, to achieve the bounded security without the key re-randomization property, key updates in our scheme are short vectors whose corresponding syndrome vector changes in each time period. For this approach to work correctly and for the scheme to be secure, cover free families play a crucial role in our construction.
引用
收藏
页码:184 / 204
页数:21
相关论文
共 50 条
  • [1] Revocable identity-based encryption with bounded decryption key exposure resistance: Lattice-based construction and more.
    Takayasu, Atsushi
    Watanabe, Yohei
    [J]. THEORETICAL COMPUTER SCIENCE, 2021, 849 : 64 - 98
  • [2] Lattice-based revocable attribute-based encryption with decryption key exposure resistance
    Dong, Xingting
    Hu, Yupu
    Wang, Baocang
    Liu, Momeng
    Gao, Wen
    [J]. IET INFORMATION SECURITY, 2021, 15 (06) : 428 - 441
  • [3] Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
    Katsumata, Shuichi
    Matsuda, Takahiro
    Takayasu, Atsushi
    [J]. THEORETICAL COMPUTER SCIENCE, 2020, 809 : 103 - 136
  • [4] Lattice-Based Searchable Encryption With Keywords Revocable and Bounded Trapdoor Exposure Resistance
    Yu, Xiaoling
    Xu, Chungen
    Xu, Lei
    [J]. IEEE ACCESS, 2019, 7 : 43179 - 43189
  • [5] Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing
    Boxue Huang
    Juntao Gao
    Xuelian Li
    [J]. Journal of Cloud Computing, 12
  • [6] Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing
    Huang, Boxue
    Gao, Juntao
    Li, Xuelian
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [7] Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability
    Wang, Xiaolei
    Wang, Yang
    Wang, Mingqiang
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 535 - 544
  • [8] Lattice-based identity-based resplittable threshold public key encryption scheme
    Singh, Kunwar
    Rangan, C. Pandu
    Banerjee, A. K.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2016, 93 (02) : 289 - 307
  • [9] Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters
    Xing, Qianqian
    Wang, Baosheng
    Wang, Xiaofeng
    Tao, Jing
    [J]. PLOS ONE, 2018, 13 (04):
  • [10] Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation
    Xu, Shengmin
    Yang, Guomin
    Mu, Yi
    [J]. INFORMATION SCIENCES, 2019, 479 : 116 - 134