Identity-Based Encryption with Outsourced Revocation in Cloud Computing

被引:287
作者
Li, Jin [1 ,2 ]
Li, Jingwei [3 ]
Chen, Xiaofeng [2 ]
Jia, Chunfu [3 ]
Lou, Wenjing [4 ]
机构
[1] Guangzhou Univ, Sch Comp Sci, Guangzhou 510500, Guangdong, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 700071, Peoples R China
[3] Nankai Univ, Coll Informat Tech Sci, Tianjin 300071, Peoples R China
[4] Virginia Polytech Inst & State Univ, Blacksburg, VA 22043 USA
基金
中国国家自然科学基金; 美国国家科学基金会; 国家教育部博士点专项基金资助;
关键词
Identity-based encryption (IBE); revocation; outsourcing; cloud computing; SECURE;
D O I
10.1109/TC.2013.208
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-Based Encryption (IBE) which simplifies the public key and certificate management at Public Key Infrastructure (PKI) is an important alternative to public key encryption. However, one of the main efficiency drawbacks of IBE is the overhead computation at Private Key Generator (PKG) during user revocation. Efficient revocation has been well studied in traditional PKI setting, but the cumbersome management of certificates is precisely the burden that IBE strives to alleviate. In this paper, aiming at tackling the critical issue of identity revocation, we introduce outsourcing computation into IBE for the first time and propose a revocable IBE scheme in the server-aided setting. Our scheme offloads most of the key generation related operations during key-issuing and key-update processes to a Key Update Cloud Service Provider, leaving only a constant number of simple operations for PKG and users to perform locally. This goal is achieved by utilizing a novel collusion-resistant technique: we employ a hybrid private key for each user, in which an AND gate is involved to connect and bound the identity component and the time component. Furthermore, we propose another construction which is provable secure under the recently formulized Refereed Delegation of Computation model. Finally, we provide extensive experimental results to demonstrate the efficiency of our proposed construction.
引用
收藏
页码:425 / 437
页数:13
相关论文
共 40 条
  • [1] Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
  • [2] Aiello W, 1998, LECT NOTES COMPUT SC, V1462, P137, DOI 10.1007/BFb0055725
  • [3] [Anonymous], P 6 ACM S INF COMP C
  • [4] [Anonymous], 2011, IACR Cryptol. ePrint Arch.
  • [5] [Anonymous], 2005, INT J INF SECUR, DOI DOI 10.1007/S10207-005-0070-3
  • [6] [Anonymous], LECT NOTES COMPUTER
  • [7] A View of Cloud Computing
    Armbrust, Michael
    Fox, Armando
    Griffith, Rean
    Joseph, Anthony D.
    Katz, Randy
    Konwinski, Andy
    Lee, Gunho
    Patterson, David
    Rabkin, Ariel
    Stoica, Ion
    Zaharia, Matei
    [J]. COMMUNICATIONS OF THE ACM, 2010, 53 (04) : 50 - 58
  • [8] Atallah M.J., 2010, Proc. ACM Symp. on Information, P48, DOI DOI 10.1145/1755688.1755695
  • [9] Atallah MJ, 2001, ADV COMPUT, V54, P215
  • [10] Private and Cheating-Free Outsourcing of Algebraic Computations
    Benjamin, David
    Atallah, Mikhail L.
    [J]. SIXTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PROCEEDINGS, 2008, : 240 - 245