CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance (Q1626131): Difference between revisions
From MaRDI portal
Removed claim: author (P16): Item:Q870855 |
Set OpenAlex properties. |
||
(2 intermediate revisions by 2 users not shown) | |||
Property / author | |||
Property / author: Yodai Watanabe / rank | |||
Normal rank | |||
Property / MaRDI profile type | |||
Property / MaRDI profile type: MaRDI publication profile / rank | |||
Normal rank | |||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1504/ijact.2017.086229 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W4230895451 / rank | |||
Normal rank |
Latest revision as of 08:57, 30 July 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance |
scientific article |
Statements
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance (English)
0 references
26 November 2018
0 references
Summary: Key revocation functionality is important for identity-based encryption (IBE) to manage users dynamically. Revocable IBE (RIBE) realises such revocation functionality with scalability. In PKC 2013, \textit{J. H. Seo} and \textit{K. Emura} [Lect. Notes Comput. Sci. 7778, 216--234 (2013; Zbl 1314.94092) first considered decryption key exposure resistance (DKER) as a new realistic threat, and proposed the first RIBE scheme with DKER. Their RIBE scheme is adaptively secure against chosen plaintext attacks (CPA), and there is no concrete RIBE scheme adaptively secure against chosen ciphertext attacks (CCA) even without DKER so far. In this paper, we first propose three constructions of adaptively CCA-secure RIBE schemes with DKER. The first and second schemes are based on an existing transformation, which is called a BCHK transformation, that a CPA-secure hierarchical IBE scheme can be transformed into a CCA-secure scheme. The third scheme is constructed via the KEM/DEM framework. Specifically, we newly propose a revocable identity-based key encapsulation mechanism (RIB-KEM), and we show a generic construction of a CCA-secure RIBE scheme from the RIB-KEM and a data encapsulation mechanism (DEM). The third scheme is more efficient than the first and second ones in terms of the ciphertext size.
0 references
CCA-security
0 references
revocable identity-based encryption
0 references
key encapsulation mechanism
0 references
complete subtree method
0 references
prime-order bilinear group
0 references
composite-order bilinear group
0 references
KEM/DEM framework
0 references