Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles

被引:10
|
作者
Watanabe, Yohei [1 ,3 ]
Shikata, Junji [1 ,2 ]
机构
[1] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama, Kanagawa, Japan
[2] Yokohama Natl Univ, Inst Adv Sci, Yokohama, Kanagawa, Japan
[3] AIST, Informat Technol Res Inst, Tokyo, Japan
来源
关键词
Key-insulated encryption; Identity-based hierarchical key-insulated encryption; Hierarchical identity-based encryption; Asymmetric pairing; PAIRINGS;
D O I
10.1007/978-3-662-49384-7_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key-insulated encryption is one of the effective solutions to a key exposure problem. Recently, identity-based encryption (IBE) has been used as one of fundamental cryptographic primitives in a wide range of various applications, and it is considered that the identity-based key-insulated security has a huge influence on the resulting applications. At Asiacrypt'05, Hanaoka et al. proposed an identity-based hierarchical key-insulated encryption (hierarchical IKE) scheme. Although their scheme is secure in the random oracle model, it has a "hierarchical key-updating structure," which is attractive functionality that enhances key exposure resistance. In this paper, we first propose the hierarchical IKE scheme without random oracles. Our hierarchical IKE scheme is secure under the symmetric external Diffie-Hellman (SXDH) assumption, which is known as the simple and static one. Furthermore, when the hierarchy depth is one (i.e. not hierarchical case), our scheme is the first IKE scheme that achieves constant-size parameters including public parameters, secret keys, and ciphertexts.
引用
收藏
页码:255 / 279
页数:25
相关论文
共 50 条
  • [1] Identity-based threshold key-insulated encryption without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Zheng, Dong
    Qiu, Weidong
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 203 - +
  • [2] Identity-based key-insulated signature without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Ma, Changshe
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 470 - +
  • [3] Identity-based key-insulated signature without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Ma, ChangShe
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1253 - 1258
  • [4] CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles
    Ren, Yanli
    Gu, Dawu
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (01) : 153 - 162
  • [5] Identity-based parallel key-insulated encryption without random oracles: Security notions and construction
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Ma, Changshe
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 409 - +
  • [6] Identity-Based strong key-insulated signature without random oracles
    Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200240, China
    不详
    不详
    Ruan Jian Xue Bao, 2008, 6 (1555-1564):
  • [7] Identity-based threshold key-insulated signature without random oracles
    Chen, Jian-Hong
    Shan, Jing-Song
    Yang, Rong-Gen
    Gong, Le-Jun
    Chen, Ke-Fei
    Yu, Kun
    Chen, Li-Qing
    Sun, Cheng-Fu
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2013, 47 (08): : 1239 - 1245
  • [8] Identity-Based Key-Insulated Proxy Signature Without Random Oracles
    陈剑洪
    龙宇
    陈克非
    王永涛
    Journal of Shanghai Jiaotong University(Science), 2011, 16 (05) : 557 - 566
  • [9] Identity-based key-insulated proxy signature without random oracles
    Chen J.-H.
    Long Y.
    Chen K.-F.
    Wang Y.-T.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (05) : 557 - 566
  • [10] Identity-based parallel key-insulated signature without random oracles
    Department of Computer Science, Jinan University, Guangzhou 510632, China
    不详
    不详
    J. Inf. Sci. Eng., 2008, 4 (1143-1157):