Attribute-Based Key-Insulated Encryption

被引:0
|
作者
Chen, Jian-Hong [1 ,2 ]
Wang, Yong-Tao [1 ]
Chen, Ke-Fei [1 ,3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Huaiyin Inst Technol, Sch Comp Engn, Huaian 223003, Peoples R China
[3] Natl Lab Modern Commun, Chengdu 610041, Peoples R China
基金
中国国家自然科学基金;
关键词
attribute based; encryption; key insulation; selective-ID security model; revocation; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is an exciting alternative to public-key encryption, as ABE develops encryption systems with high expressiveness, without the need for a public key infrastructure (PKI) that makes publicly available the mapping between identities (sets of attributes), public keys, and validity of the latter. Any setting, PKI or attribute-based, must provide a means to revoke users from the system. To mitigate the limitation of ABE with regard to revocation, we propose an attribute-based key-insulated encryption (ABKIE) scheme, which is a novel ABE scheme. In our ABKIE scheme, a private key can be renewed without having to make changes to its public key (a set of attributes). The scheme is secure against adaptive chosen ciphertext attacks. The formal proof of security is presented under the Selective-ID security model, i.e. without random oracles, assuming the decision Bilinear Diffie-Hellman problem is computationally hard. To the best of our knowledge, this is the first ABKIE scheme up to now. Further, this is also the first concrete ABE construction with regard to revocation.
引用
收藏
页码:437 / 449
页数:13
相关论文
共 50 条
  • [31] Attribute-based encryption
    Sahai, Amit
    Waters, Brent
    Lu, Steve
    Cryptology and Information Security Series, 2009, 2 : 156 - 168
  • [32] Parallel key-insulated public key encryption without random oracles
    Libert, Benoit
    Quisquater, Jean-Jacques
    Yung, Moti
    PUBLIC KEY CRYPTOGRAPHY - PKC 2007, 2007, 4450 : 298 - +
  • [33] Identity-based hierarchical strongly key-insulated encryption and its application
    Hanaoka, Y
    Hanaoka, G
    Shikata, J
    Imai, H
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 495 - 514
  • [34] Practical parallel key-insulated encryption with multiple helper keys
    Ren, Yanli
    Wang, Shuozhong
    Zhang, Xinpeng
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2013, 65 (09) : 1403 - 1412
  • [35] Identity-based threshold key-insulated encryption without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Zheng, Dong
    Qiu, Weidong
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 203 - +
  • [36] A NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME
    Lin, Han-Yu
    Hsu, Chien-Lung
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (03) : 739 - 756
  • [37] Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
    Watanabe, Yohei
    Shikata, Junji
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 2016, 9614 : 255 - 279
  • [38] Hierarchical Authority Key-Policy Attribute-Based Encryption
    You, Lin
    Wang, Lijun
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 868 - 872
  • [39] Attribute-Based and Keywords Vector Searchable Public Key Encryption
    Wang, Huiwen
    Li, Jianqiang
    Yang, Yanli
    Ming, Zhong
    SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 317 - 326
  • [40] Accountable attribute-based encryption scheme without key escrow
    Zhang, Xing
    Wen, Zilong
    Shen, Qingni
    Fang, Yuejian
    Wu, Zhonghai
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2293 - 2303