Mergeable and Revocable Identity-Based Encryption

被引:0
作者
Xu, Shengmin [1 ]
Yang, Guomin [1 ]
Mu, Yi [1 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW, Australia
来源
INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I | 2017年 / 10342卷
关键词
Identity-based encryption; Revocation; Merging;
D O I
10.1007/978-3-319-60055-0_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based encryption (IBE) has been extensively studied and widely used in various applications since Boneh and Franklin proposed the first practical scheme based on pairing. In that seminal work, it has also been pointed out that providing an efficient revocation mechanism for IBE is essential. Hence, revocable identity-based encryption (RIBE) has been proposed in the literature to offer an efficient revocation mechanism. In contrast to revocation, another issue that will also occur in practice is to combine two or multiple IBE systems into one system, e.g., due to the merge of the departments or companies. However, this issue has not been formally studied in the literature and the naive solution of creating a completely new system is inefficient. In order to efficiently address this problem, in this paper we propose the notion of mergeable and revocable identity-based encryption (MRIBE). Our scheme provides the first solution to efficiently revoke users and merge multiple IBE systems into a single system. The proposed scheme also has several nice features: when two systems are merged, there is no secure channel needed for the purpose of updating user private keys; and the size of the user private key remains unchanged when multiple systems are merged. We also propose a new security model for MRIBE, which is an extension of the security model for RIBE, and prove that the proposed scheme is semantically secure without random oracles.
引用
收藏
页码:147 / 167
页数:21
相关论文
共 21 条
[1]  
[Anonymous], IACR CRYPTOLOGY EPRI
[2]  
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[3]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[4]  
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[5]  
Dodis Y, 2002, LECT NOTES COMPUT SC, V2696, P61
[6]  
Gentry C, 2006, LECT NOTES COMPUT SC, V4004, P445
[7]  
Goldreich O., 1984, 25th Annual Symposium on Foundations of Computer Science (Cat. No. 84CH2085-9), P464, DOI 10.1109/SFCS.1984.715949
[8]  
Halevy D, 2002, LECT NOTES COMPUT SC, V2442, P47
[9]  
Hanaoka Y, 2005, LECT NOTES COMPUT SC, V3788, P495
[10]  
Jae Hong Seo, 2015, Topics in Cryptology - CT-RSA 2015. The Cryptographers' Track at the RSA Conference 2015. Proceedings: LNCS 9048, P106, DOI 10.1007/978-3-319-16715-2_6