An Efficient Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption Scheme

被引:2
作者
Wang, Changji [1 ]
Li, Yuan [2 ]
Jiang, Shengyi [1 ]
Wu, Jiayuan [3 ]
机构
[1] Guangdong Univ Foreign Studies, Cisco Sch Informat, Collaborat Innovat Ctr 21st Century Maritime Silk, Guangzhou 510006, Guangdong, Peoples R China
[2] Fudan Univ, Sch Comp Sci, Shanghai 200433, Peoples R China
[3] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
来源
SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016 | 2017年 / 10135卷
基金
中国国家自然科学基金;
关键词
Hierarchical identity-based encryption; Revocable identity-based encryption; Revocable hierarchical identity-based encryption; Dual system encryption; Predicate encoding; DUAL SYSTEM ENCRYPTION; HIBE; CRYPTOGRAPHY;
D O I
10.1007/978-3-319-52015-5_52
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User revocation is an important functional requirement in hierarchical identity-based encryption (HIBE) scheme from the point of practical applications. In this paper, we propose a revocable HIBE scheme with constant ciphertext size and prove it is semantic secure under the strong adaptive-ID model by employing the recent dual system encryption methodology and predicate encoding technique.
引用
收藏
页码:506 / 515
页数:10
相关论文
共 19 条
  • [1] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [2] Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
  • [3] Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
  • [4] Hierarchical ID-based cryptography
    Gentry, C
    Silverberg, A
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 548 - 566
  • [5] Goyal V., 2006, P 2006 INT C PRIVACY, P1
  • [6] Some (in)sufficient conditions for secure hybrid encryption
    Herranz, Javier
    Hofheinz, Dennis
    Kiltz, Eike
    [J]. INFORMATION AND COMPUTATION, 2010, 208 (11) : 1243 - 1257
  • [7] Toward hierarchical identity-based encryption
    Horwitz, J
    Lynn, B
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 466 - 481
  • [8] Jae Hong Seo, 2015, Topics in Cryptology - CT-RSA 2015. The Cryptographers' Track at the RSA Conference 2015. Proceedings: LNCS 9048, P106, DOI 10.1007/978-3-319-16715-2_6
  • [9] Jae Hong Seo, 2013, Topics in Cryptology - CT-RSA 2013. The Cryptographers Track at the RSA Conference 2013. Proceedings, P343, DOI 10.1007/978-3-642-36095-4_22
  • [10] Lewko A, 2010, LECT NOTES COMPUT SC, V5978, P455, DOI 10.1007/978-3-642-11799-2_27