Revocable hierarchical identity-based encryption with shorter private keys and update keys

被引:0
|
作者
Kwangsu Lee
Seunghwan Park
机构
[1] Sejong University,
[2] Korea University,undefined
来源
关键词
Identity-based encryption; Hierarchical identity-based encryption; Key revocation; Modular design; Bilinear maps; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
Revocable hierarchical identity-based encryption (RHIBE) is an extension of HIBE that supports the revocation of user’s private keys to manage the dynamic credentials of users in a system. Many different RHIBE schemes were proposed previously, but they are not efficient in terms of the private key size and the update key size since the depth of a hierarchical identity is included as a multiplicative factor. In this paper, we propose efficient RHIBE schemes with shorter private keys and update keys and small public parameters by removing this multiplicative factor. To achieve our goals, we first present a new HIBE scheme with the different generation of private keys such that a private key can be simply derived from a short intermediate private key. Next, we show that two efficient RHIBE schemes can be built by combining our HIBE scheme, an IBE scheme, and a tree based broadcast encryption scheme in a modular way.
引用
收藏
页码:2407 / 2440
页数:33
相关论文
共 50 条
  • [1] Revocable hierarchical identity-based encryption with shorter private keys and update keys
    Lee, Kwangsu
    Park, Seunghwan
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (10) : 2407 - 2440
  • [2] Delegate and Verify the Update Keys of Revocable Identity-Based Encryption
    Lee, Kwangsu
    IEEE ACCESS, 2023, 11 : 52636 - 52652
  • [3] Hierarchical Identity-Based Encryption with Constant-Size Private Keys
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    ETRI JOURNAL, 2012, 34 (01) : 142 - 145
  • [4] Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys
    Zhang, Leyou
    Mu, Yi
    Wu, Qing
    COMPUTER JOURNAL, 2016, 59 (04): : 452 - 461
  • [5] Revocable hierarchical identity-based encryption
    Seo, Jae Hong
    Emura, Keita
    THEORETICAL COMPUTER SCIENCE, 2014, 542 : 44 - 62
  • [6] Identity-based broadcast encryption with constant size ciphertexts and private keys
    Delerablee, Cecile
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 200 - 215
  • [7] Revocable Hierarchical Identity-Based Broadcast Encryption
    Dawei Li
    Jianwei Liu
    Zongyang Zhang
    Qianhong Wu
    Weiran Liu
    TsinghuaScienceandTechnology, 2018, 23 (05) : 539 - 549
  • [8] Revocable Hierarchical Identity-Based Broadcast Encryption
    Li, Dawei
    Liu, Jianwei
    Zhang, Zongyang
    Wu, Qianhong
    Liu, Weiran
    TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 539 - 549