Revocable hierarchical identity-based encryption with shorter private keys and update keys

被引:0
|
作者
Kwangsu Lee
Seunghwan Park
机构
[1] Sejong University,
[2] Korea University,undefined
来源
关键词
Identity-based encryption; Hierarchical identity-based encryption; Key revocation; Modular design; Bilinear maps; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
Revocable hierarchical identity-based encryption (RHIBE) is an extension of HIBE that supports the revocation of user’s private keys to manage the dynamic credentials of users in a system. Many different RHIBE schemes were proposed previously, but they are not efficient in terms of the private key size and the update key size since the depth of a hierarchical identity is included as a multiplicative factor. In this paper, we propose efficient RHIBE schemes with shorter private keys and update keys and small public parameters by removing this multiplicative factor. To achieve our goals, we first present a new HIBE scheme with the different generation of private keys such that a private key can be simply derived from a short intermediate private key. Next, we show that two efficient RHIBE schemes can be built by combining our HIBE scheme, an IBE scheme, and a tree based broadcast encryption scheme in a modular way.
引用
收藏
页码:2407 / 2440
页数:33
相关论文
共 50 条
  • [31] Outsourced revocable identity-based encryption from lattices
    Dong, Chengcheng
    Yang, Kang
    Qiu, Jian
    Chen, Yuanfang
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (11):
  • [32] Identity-based broadcast encryption with shorter transmissions
    Zhang L.-Y.
    Hu Y.-P.
    Mu N.-B.
    J. Shanghai Jiaotong Univ. Sci., 2008, 6 (641-645): : 641 - 645
  • [33] Identity-based Broadcast Encryption with Shorter Transmissions
    张乐友
    胡予濮
    牟宁波
    JournalofShanghaiJiaotongUniversity(Science), 2008, 13 (06) : 641 - 645
  • [34] Unconditionally Secure Authenticated Encryption with Shorter Keys
    Alomair, Basel
    Poovendran, Radha
    SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2009, : 3 - 15
  • [35] Revocable Hierarchical Identity-Based Authenticated Key Exchange
    Okano, Yuki
    Tomida, Junichi
    Nagai, Akira
    Yoneyama, Kazuki
    Fujioka, Atsushi
    Suzuki, Koutarou
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021, 2022, 13218 : 3 - 27
  • [36] Semi-Generic Transformation of Revocable Hierarchical Identity-Based Encryption and Its DBDH Instantiation
    Emura, Keita
    Seo, Jae Hong
    Youn, Taek-Young
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (01) : 83 - 91
  • [37] Identity-Based Parallel Key-Insulated Encryption with Multiple Long-Term Keys
    Ren, Yanli
    Wang, Shuozhong
    Zhang, Xinpeng
    Qian, Zhenxing
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 376 - 379
  • [38] Identity-Based Parallel Key-Insulated Encryption with Multiple Long-Term Keys
    Ren, Yanli
    Wang, Shuozhong
    Zhang, Xinpeng
    Qian, Zhenxing
    PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON INFORMATICS, CYBERNETICS, AND COMPUTER ENGINEERING (ICCE2011), VOL 1: INTELLIGENT CONTROL AND NETWORK COMMUNICATION, 2011, 110 (01): : 277 - 283
  • [39] Toward hierarchical identity-based encryption
    Horwitz, J
    Lynn, B
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 466 - 481
  • [40] Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 242 - 257