CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance (Q1626131): Difference between revisions

From MaRDI portal
Created claim: Wikidata QID (P12): Q121438938, #quickstatements; #temporary_batch_1706364719135
Set OpenAlex properties.
 
(4 intermediate revisions by 3 users not shown)
Property / author
 
Property / author: Yodai Watanabe / rank
Normal rank
 
Property / author
 
Property / author: Yodai Watanabe / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1504/ijact.2017.086229 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W4230895451 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 08:57, 30 July 2024

scientific article
Language Label Description Also known as
English
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance
scientific article

    Statements

    CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance (English)
    0 references
    0 references
    0 references
    0 references
    26 November 2018
    0 references
    Summary: Key revocation functionality is important for identity-based encryption (IBE) to manage users dynamically. Revocable IBE (RIBE) realises such revocation functionality with scalability. In PKC 2013, \textit{J. H. Seo} and \textit{K. Emura} [Lect. Notes Comput. Sci. 7778, 216--234 (2013; Zbl 1314.94092) first considered decryption key exposure resistance (DKER) as a new realistic threat, and proposed the first RIBE scheme with DKER. Their RIBE scheme is adaptively secure against chosen plaintext attacks (CPA), and there is no concrete RIBE scheme adaptively secure against chosen ciphertext attacks (CCA) even without DKER so far. In this paper, we first propose three constructions of adaptively CCA-secure RIBE schemes with DKER. The first and second schemes are based on an existing transformation, which is called a BCHK transformation, that a CPA-secure hierarchical IBE scheme can be transformed into a CCA-secure scheme. The third scheme is constructed via the KEM/DEM framework. Specifically, we newly propose a revocable identity-based key encapsulation mechanism (RIB-KEM), and we show a generic construction of a CCA-secure RIBE scheme from the RIB-KEM and a data encapsulation mechanism (DEM). The third scheme is more efficient than the first and second ones in terms of the ciphertext size.
    0 references
    CCA-security
    0 references
    revocable identity-based encryption
    0 references
    key encapsulation mechanism
    0 references
    complete subtree method
    0 references
    prime-order bilinear group
    0 references
    composite-order bilinear group
    0 references
    KEM/DEM framework
    0 references

    Identifiers