Efficient revocable identity-based encryption via subset difference methods

被引:0
|
作者
Kwangsu Lee
Dong Hoon Lee
Jong Hwan Park
机构
[1] Sejong University,
[2] Korea University,undefined
[3] Sangmyung University,undefined
来源
关键词
Identity-based encryption; Revocable identity-based encryption; Key revocation; Subset difference method; Bilinear maps; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
Providing an efficient revocation mechanism for identity-based encryption (IBE) is very important since a user’s credential (or private key) can be expired or revealed. revocable IBE (RIBE) is an extension of IBE that provides an efficient revocation mechanism. Previous RIBE schemes essentially use the complete subtree (CS) scheme of Naor, Naor and Lotspiech (CRYPTO 2001) for key revocation. In this paper, we present a new technique for RIBE that uses the efficient subset difference (SD) scheme of Naor et al. instead of using the CS scheme to improve the size of update keys. Following our new technique, we first propose an efficient RIBE scheme in prime-order bilinear groups by combining the IBE scheme of Boneh and Boyen and the SD scheme and prove its selective security under the standard assumption. Our RIBE scheme is the first RIBE scheme in bilinear groups that has O(r) number of group elements in an update key where r is the number of revoked users. Next, we also propose another RIBE scheme in composite-order bilinear groups and prove its full security under static assumptions. Our RIBE schemes also can be integrated with the layered subset difference scheme of Halevy and Shamir (CRYPTO 2002) to reduce the size of a private key.
引用
收藏
页码:39 / 76
页数:37
相关论文
共 50 条
  • [1] Efficient revocable identity-based encryption via subset difference methods
    Lee, Kwangsu
    Lee, Dong Hoon
    Park, Jong Hwan
    DESIGNS CODES AND CRYPTOGRAPHY, 2017, 85 (01) : 39 - 76
  • [2] A generic construction for revocable identity-based encryption with subset difference methods
    Lee, Kwangsu
    PLOS ONE, 2020, 15 (09):
  • [3] Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method
    Cheng, Shantian
    Zhang, Juanyang
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 283 - 297
  • [4] Revocable hierarchical identity-based encryption
    Seo, Jae Hong
    Emura, Keita
    THEORETICAL COMPUTER SCIENCE, 2014, 542 : 44 - 62
  • [5] Mergeable and Revocable Identity-Based Encryption
    Xu, Shengmin
    Yang, Guomin
    Mu, Yi
    Susilo, Willy
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 : 147 - 167
  • [6] An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Xia, Xiaonan
    Zheng, Kangjia
    PLOS ONE, 2014, 9 (09):
  • [7] Efficient revocable identity-based encryption from multilinear maps
    Mao, Xianping
    Lai, Junzuo
    Chen, Kefei
    Weng, Jian
    Mei, Qixiang
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3511 - 3522
  • [8] Efficient revocable identity-based encryption with short public parameters
    Emura, Keita
    Seo, Jae Hong
    Watanabe, Yohei
    THEORETICAL COMPUTER SCIENCE, 2021, 863 : 127 - 155
  • [9] Efficient revocable hierarchical identity-based encryption using cryptographic accumulators
    Hongyong Jia
    Yue Chen
    Julong Lan
    Kaixiang Huang
    Jun Wang
    International Journal of Information Security, 2018, 17 : 477 - 490
  • [10] Revocable Hierarchical Identity-Based Broadcast Encryption
    Dawei Li
    Jianwei Liu
    Zongyang Zhang
    Qianhong Wu
    Weiran Liu
    TsinghuaScienceandTechnology, 2018, 23 (05) : 539 - 549