Attribute-Based Key-Insulated Encryption

被引:0
作者
Chen, Jian-Hong [1 ,2 ]
Wang, Yong-Tao [1 ]
Chen, Ke-Fei [1 ,3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Huaiyin Inst Technol, Sch Comp Engn, Huaian 223003, Peoples R China
[3] Natl Lab Modern Commun, Chengdu 610041, Peoples R China
基金
中国国家自然科学基金;
关键词
attribute based; encryption; key insulation; selective-ID security model; revocation; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is an exciting alternative to public-key encryption, as ABE develops encryption systems with high expressiveness, without the need for a public key infrastructure (PKI) that makes publicly available the mapping between identities (sets of attributes), public keys, and validity of the latter. Any setting, PKI or attribute-based, must provide a means to revoke users from the system. To mitigate the limitation of ABE with regard to revocation, we propose an attribute-based key-insulated encryption (ABKIE) scheme, which is a novel ABE scheme. In our ABKIE scheme, a private key can be renewed without having to make changes to its public key (a set of attributes). The scheme is secure against adaptive chosen ciphertext attacks. The formal proof of security is presented under the Selective-ID security model, i.e. without random oracles, assuming the decision Bilinear Diffie-Hellman problem is computationally hard. To the best of our knowledge, this is the first ABKIE scheme up to now. Further, this is also the first concrete ABE construction with regard to revocation.
引用
收藏
页码:437 / 449
页数:13
相关论文
共 17 条
[1]  
[Anonymous], PROTECTING KEY EXPOS
[2]  
[Anonymous], 1985, LNCS, DOI DOI 10.1007/3-540-39568-722
[3]  
Boldyreva A., IDENTITY BASED ENCRY
[4]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3376, P87
[5]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[6]  
Boyen X., 2005, Proc. 12th ACM Conference on Computer and Communications Security (CCS), P320
[7]   Chosen-ciphertext security from identity-based encryption [J].
Canetti, R ;
Halevi, S ;
Katz, J .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 :207-222
[8]  
Dodis Y, 2002, LECT NOTES COMPUT SC, V2332, P65
[9]   HOW TO CONSTRUCT RANDOM FUNCTIONS [J].
GOLDREICH, O ;
GOLDWASSER, S ;
MICALI, S .
JOURNAL OF THE ACM, 1986, 33 (04) :792-807
[10]  
Hanaoka G, 2006, LECT NOTES COMPUT SC, V3958, P105