Efficient revocable identity-based encryption via subset difference methods

被引:0
|
作者
Kwangsu Lee
Dong Hoon Lee
Jong Hwan Park
机构
[1] Sejong University,
[2] Korea University,undefined
[3] Sangmyung University,undefined
来源
关键词
Identity-based encryption; Revocable identity-based encryption; Key revocation; Subset difference method; Bilinear maps; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
Providing an efficient revocation mechanism for identity-based encryption (IBE) is very important since a user’s credential (or private key) can be expired or revealed. revocable IBE (RIBE) is an extension of IBE that provides an efficient revocation mechanism. Previous RIBE schemes essentially use the complete subtree (CS) scheme of Naor, Naor and Lotspiech (CRYPTO 2001) for key revocation. In this paper, we present a new technique for RIBE that uses the efficient subset difference (SD) scheme of Naor et al. instead of using the CS scheme to improve the size of update keys. Following our new technique, we first propose an efficient RIBE scheme in prime-order bilinear groups by combining the IBE scheme of Boneh and Boyen and the SD scheme and prove its selective security under the standard assumption. Our RIBE scheme is the first RIBE scheme in bilinear groups that has O(r) number of group elements in an update key where r is the number of revoked users. Next, we also propose another RIBE scheme in composite-order bilinear groups and prove its full security under static assumptions. Our RIBE schemes also can be integrated with the layered subset difference scheme of Halevy and Shamir (CRYPTO 2002) to reduce the size of a private key.
引用
收藏
页码:39 / 76
页数:37
相关论文
共 50 条
  • [21] An Efficient Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Jiang, Shengyi
    Wu, Jiayuan
    SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 506 - 515
  • [22] An efficient revocable identity-based encryption with ciphertext evolution in the cloud-assisted system
    Chen, Zhiwei
    Deng, Lunzhi
    Ruan, Yu
    Feng, Shuai
    Wang, Tao
    Wang, Bo
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (22):
  • [23] Revocable Identity-Based Encryption from Codes with Rank Metric
    Chang, Donghoon
    Chauhan, Amit Kumar
    Kumar, Sandeep
    Sanadhya, Somitra Kumar
    TOPICS IN CRYPTOLOGY - CT-RSA 2018, 2018, 10808 : 435 - 451
  • [24] A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption
    Lee, Kwangsu
    Kim, Joon Sik
    IEEE ACCESS, 2022, 10 : 44178 - 44199
  • [25] Revocable Identity-Based Searchable Encryption Scheme for Smart Grid
    Wang, Aqian
    Qin, Baodong
    Fan, Yajun
    2024 6TH INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE PROCESSING, ICNLP 2024, 2024, : 722 - 727
  • [26] Revocable Identity-Based Encryption Scheme with Leakage-Resilience
    Zhou Y.-W.
    Yang B.
    Xia Z.
    Lai Q.-Q.
    Zhang M.-W.
    Mu Y.
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (08): : 1534 - 1554
  • [27] Simplified Revocable Hierarchical Identity-Based Encryption from Lattices
    Wang, Shixiong
    Zhang, Juanyang
    He, Jingnan
    Wang, Huaxiong
    Li, Chao
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 99 - 119
  • [28] Constructions of CCA-Secure Revocable Identity-Based Encryption
    Ishida, Yuu
    Watanabe, Yohei
    Shikata, Junji
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 174 - 191
  • [29] Delegate and Verify the Update Keys of Revocable Identity-Based Encryption
    Lee, Kwangsu
    IEEE ACCESS, 2023, 11 : 52636 - 52652
  • [30] On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices
    Zhang, Yanhua
    Liu, Ximeng
    Hu, Yupu
    Jia, Huiwen
    NETWORK AND SYSTEM SECURITY, NSS 2021, 2021, 13041 : 79 - 99