Attribute-Based Key-Insulated Encryption

被引:0
|
作者
Chen, Jian-Hong [1 ,2 ]
Wang, Yong-Tao [1 ]
Chen, Ke-Fei [1 ,3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Huaiyin Inst Technol, Sch Comp Engn, Huaian 223003, Peoples R China
[3] Natl Lab Modern Commun, Chengdu 610041, Peoples R China
基金
中国国家自然科学基金;
关键词
attribute based; encryption; key insulation; selective-ID security model; revocation; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is an exciting alternative to public-key encryption, as ABE develops encryption systems with high expressiveness, without the need for a public key infrastructure (PKI) that makes publicly available the mapping between identities (sets of attributes), public keys, and validity of the latter. Any setting, PKI or attribute-based, must provide a means to revoke users from the system. To mitigate the limitation of ABE with regard to revocation, we propose an attribute-based key-insulated encryption (ABKIE) scheme, which is a novel ABE scheme. In our ABKIE scheme, a private key can be renewed without having to make changes to its public key (a set of attributes). The scheme is secure against adaptive chosen ciphertext attacks. The formal proof of security is presented under the Selective-ID security model, i.e. without random oracles, assuming the decision Bilinear Diffie-Hellman problem is computationally hard. To the best of our knowledge, this is the first ABKIE scheme up to now. Further, this is also the first concrete ABE construction with regard to revocation.
引用
收藏
页码:437 / 449
页数:13
相关论文
共 50 条
  • [1] Attribute-Based Parallel Key-Insulated Signature
    Chen, Jianhong
    Yu, Kun
    Long, Yu
    Chen, Kefei
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2015, 15 (03) : 26 - 40
  • [2] Attribute-based key-insulated signature and its applications
    Chen, Jianhong
    Long, Yu
    Chen, Kefei
    Guo, Jie
    INFORMATION SCIENCES, 2014, 275 : 57 - 67
  • [3] Attribute-based key-insulated signature for boolean formula
    Rao, Y. Sreenivasa
    Dutta, Ratna
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2016, 93 (06) : 864 - 888
  • [4] Attribute-based key-insulated signcryption with bidirectional anonymity
    Zhang, Xing-Lan
    Zhang, Zhen
    Tongxin Xuebao/Journal on Communications, 2013, 34 (11): : 42 - 50
  • [5] Signature-policy attribute-based key-insulated signature
    Rao, Y. Sreenivasa
    IET INFORMATION SECURITY, 2017, 11 (01) : 23 - 33
  • [6] Bandwidth-efficient attribute-based key-insulated signatures with message recovery
    Rao, Y. Sreenivasa
    Dutta, Ratna
    INFORMATION SCIENCES, 2016, 369 : 648 - 673
  • [7] Attribute Based Key-Insulated Signatures with Message Recovery
    Rao, Y. Sreenivasa
    Dutta, Ratna
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 215 - 229
  • [8] Parallel key-insulated public key encryption
    Hanaoka, Goichiro
    Hanaoka, Yumiko
    Imai, Hideki
    PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS, 2006, 3958 : 105 - 122
  • [9] High efficient key-insulated attribute based encryption scheme without bilinear pairing operations
    Hong, Hanshu
    Sun, Zhixin
    SPRINGERPLUS, 2016, 5 : 1 - 12
  • [10] Key Cooperative Attribute-Based Encryption
    Huang, Luqi
    Susilo, Willy
    Yang, Guomin
    Guo, Fuchun
    INFORMATION SECURITY AND PRIVACY, PT I, ACISP 2024, 2024, 14895 : 241 - 260