Delegate and Verify the Update Keys of Revocable Identity-Based Encryption

被引:0
作者
Lee, Kwangsu [1 ,2 ,3 ,4 ]
机构
[1] Yonsei Univ, Comp Sci, Seoul, South Korea
[2] Korea Adv Inst Sci & Technol, Comp Sci, Daejeon, South Korea
[3] Korea Univ, Informat Secur, Seoul, South Korea
[4] Sejong Univ, Dept Comp & Informat Secur, Seoul, South Korea
关键词
Binary trees; Servers; Security; Public key; Identity-based encryption; Encryption; Hash functions; key revocation; subset cover; update key delegation; public verifiability; BROADCAST ENCRYPTION;
D O I
10.1109/ACCESS.2023.3280253
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Revocable identity-based encryption (RIBE) is an extension of identity-based encryption (IBE) and it supports efficient revocation of private keys. In the past, many efficient RIBE schemes have been proposed, but research on efficiently delegating the generation of update keys to a cloud server is somewhat insufficient. In this paper, we newly introduce the concept of delegated RIBE (DRIBE) that can delegate the generation of update keys to the semi-trusted cloud server and define the security models of DRIBE. Next, we propose a DRIBE scheme by generically combining a hierarchical IBE (HIBE) scheme, an identity-based broadcast encryption (IBBE) scheme, and a collision-resistant hash function. In addition, we propose a DRIBE-INC scheme that generates an occasional base update key and a periodic incremental update key to reduce the size of update keys in our DRIBE scheme.
引用
收藏
页码:52636 / 52652
页数:17
相关论文
共 35 条
  • [1] Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
  • [2] Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
  • [3] Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
  • [4] Hierarchical identity based encryption with constant size ciphertext
    Boneh, D
    Boyen, X
    Goh, EJ
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 440 - 456
  • [5] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
  • [6] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [7] Brakerski Z., 2022, P INN THEOR COMP SCI, V215
  • [8] Cash D, 2010, LECT NOTES COMPUT SC, V6110, P523
  • [9] Cocks C., 2001, Lecture Notes in Computer Science, V2260, P360, DOI [DOI 10.1007/3-540-45325-3, DOI 10.1007/3-540-45325-332, 10.1007/3-540-45325-3]
  • [10] Cooper D., 2008, RFC 5280