Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption Key Exposure Resistance

被引:32
|
作者
Takayasu, Atsushi [1 ,3 ]
Watanabe, Yohei [2 ,3 ]
机构
[1] Univ Tokyo, Tokyo, Japan
[2] Univ Electrocommun, Tokyo, Japan
[3] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
关键词
TRAPDOORS;
D O I
10.1007/978-3-319-60055-0_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A revocable identity-based encryption (RIBE) scheme, proposed by Boldyreva et al., provides a revocation functionality for managing a number of users dynamically and efficiently. To capture a realistic scenario, Seo and Emura introduced an additional important security notion, called decryption key exposure resistance (DKER), where an adversary is allowed to query short-term decryption keys. Although several RIBE schemes that satisfy DKER have been proposed, all the lattice-based RIBE schemes, e.g., Chen et al.' s scheme, do not achieve DKER, since they basically do not have the key re-randomization property, which is considered to be an essential requirement for achieving DKER. In particular, in every existing lattice-based RIBE scheme, an adversary can easily recover plaintexts if the adversary is allowed to issue even a single short-term decryption key query. In this paper, we propose a new lattice-based RIBE scheme secure against exposure of a-priori bounded number of decryption keys (for every identity). We believe that this bounded notion is still meaningful and useful from a practical perspective. Technically, to achieve the bounded security without the key re-randomization property, key updates in our scheme are short vectors whose corresponding syndrome vector changes in each time period. For this approach to work correctly and for the scheme to be secure, cover free families play a crucial role in our construction.
引用
收藏
页码:184 / 204
页数:21
相关论文
共 50 条
  • [32] Revocable identity-based matchmaking encryption in the standard model
    Jiang, Zhe
    Wang, Xiwen
    Zhang, Kai
    Gong, Junqing
    Chen, Jie
    Qian, Haifeng
    [J]. IET INFORMATION SECURITY, 2023, 17 (04) : 567 - 581
  • [33] Outsourced revocable identity-based encryption from lattices
    Dong, Chengcheng
    Yang, Kang
    Qiu, Jian
    Chen, Yuanfang
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (11):
  • [34] Efficient revocable certificateless encryption against decryption key exposure
    Sun, Yinxia
    Zhang, Futai
    Shen, Limin
    Deng, Robert H.
    [J]. IET INFORMATION SECURITY, 2015, 9 (03) : 158 - 166
  • [35] Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure
    Qin, Baodong
    Zhao, Qinglan
    Zheng, Dong
    Cui, Hui
    [J]. CRYPTOLOGY AND NETWORK SECURITY (CANS 2017), 2018, 11261 : 504 - 514
  • [36] Identity-based encryption: How to decrypt multiple ciphertexts using a single decryption key
    Guo, Fuchun
    Mu, Yi
    Chen, Zhide
    [J]. PAIRING-BASED CRYPTOGRAPHY - PAIRING 2007, 2007, 4575 : 392 - 406
  • [37] Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage
    Zhang, Xiaojun
    Tang, Yao
    Wang, Huaxiong
    Xu, Chunxiang
    Miao, Yinbin
    Cheng, Hang
    [J]. INFORMATION SCIENCES, 2019, 494 : 193 - 207
  • [38] Simplified Revocable Hierarchical Identity-Based Encryption from Lattices
    Wang, Shixiong
    Zhang, Juanyang
    He, Jingnan
    Wang, Huaxiong
    Li, Chao
    [J]. CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 99 - 119
  • [39] A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption
    Lee, Kwangsu
    Kim, Joon Sik
    [J]. IEEE ACCESS, 2022, 10 : 44178 - 44199
  • [40] Revocable Identity-Based Encryption from Codes with Rank Metric
    Chang, Donghoon
    Chauhan, Amit Kumar
    Kumar, Sandeep
    Sanadhya, Somitra Kumar
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2018, 2018, 10808 : 435 - 451