Efficient revocable identity-based encryption via subset difference methods

被引:0
|
作者
Kwangsu Lee
Dong Hoon Lee
Jong Hwan Park
机构
[1] Sejong University,
[2] Korea University,undefined
[3] Sangmyung University,undefined
来源
关键词
Identity-based encryption; Revocable identity-based encryption; Key revocation; Subset difference method; Bilinear maps; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
Providing an efficient revocation mechanism for identity-based encryption (IBE) is very important since a user’s credential (or private key) can be expired or revealed. revocable IBE (RIBE) is an extension of IBE that provides an efficient revocation mechanism. Previous RIBE schemes essentially use the complete subtree (CS) scheme of Naor, Naor and Lotspiech (CRYPTO 2001) for key revocation. In this paper, we present a new technique for RIBE that uses the efficient subset difference (SD) scheme of Naor et al. instead of using the CS scheme to improve the size of update keys. Following our new technique, we first propose an efficient RIBE scheme in prime-order bilinear groups by combining the IBE scheme of Boneh and Boyen and the SD scheme and prove its selective security under the standard assumption. Our RIBE scheme is the first RIBE scheme in bilinear groups that has O(r) number of group elements in an update key where r is the number of revoked users. Next, we also propose another RIBE scheme in composite-order bilinear groups and prove its full security under static assumptions. Our RIBE schemes also can be integrated with the layered subset difference scheme of Halevy and Shamir (CRYPTO 2002) to reduce the size of a private key.
引用
收藏
页码:39 / 76
页数:37
相关论文
共 50 条
  • [41] Identity-based encryption and hierarchical identity-based encryption
    University of Waterloo, Canada
    不详
    Cryptology Inf. Secur. Ser., 2009, (45-64):
  • [42] Identity-Based Revocation From Subset Difference Methods Under Simple Assumptions
    Lee, Kwangsu
    Park, Jong Hwan
    IEEE ACCESS, 2019, 7 : 60333 - 60347
  • [43] CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud
    Sun, Yinxia
    Susilo, Willy
    Zhang, Futai
    Fu, Anmin
    IEEE ACCESS, 2018, 6 : 56977 - 56983
  • [44] Revocable Identity-Based Encryption Scheme Under LWE Assumption the Standard Model
    Zhang, Yaling
    Wang, Shangping
    Du, Qing
    IEEE ACCESS, 2018, 6 : 65298 - 65307
  • [45] Revocable hierarchical identity-based encryption with shorter private keys and update keys
    Lee, Kwangsu
    Park, Seunghwan
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (10) : 2407 - 2440
  • [46] Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID Security
    Xing, Qianqian
    Wang, Baosheng
    Wang, Xiaofeng
    Chen, Peixin
    Yu, Bo
    Tang, Yong
    Gao, Xianming
    PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, : 430 - 437
  • [47] Revocable hierarchical identity-based encryption with shorter private keys and update keys
    Kwangsu Lee
    Seunghwan Park
    Designs, Codes and Cryptography, 2018, 86 : 2407 - 2440
  • [48] Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption
    Saravanakumar, S.
    Chitra, S.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (03): : 985 - 996
  • [49] Simplified Server-Aided Revocable Identity-Based Encryption from Lattices
    Zhang, Yanhua
    Liu, Ximeng
    Hu, Yupu
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 : 71 - 87
  • [50] Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem
    Hu, Ziyuan
    Liu, Shengli
    Chen, Kefei
    Liu, Joseph K.
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 265 - 283