Adaptive-ID secure revocable hierarchical identity-based encryption

Jae Hong Seo, Keita Emura

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Abstract

Revocable Hierarchical Identity-Based Encryption (RHIBE) is a variant of Identity-Based Encryption (IBE), which enables the dynamic user management; a Key Generation Center (KGC) of a usual IBE has a key issuing ability. In contrast, in a RHIBE, a KGC can revoke compromised secret keys and even delegate both key issuing ability and revocation ability. Recently, Seo and Emura proposed the first construction for RHIBE (CT-RSA 2013) and then refined the security model and the construction for RHIBE (CT-RSA 2015). Nevertheless, their constructions achieve only a slightly weaker security notion, called selective-ID security, in the sense that the adversary has to choose and declare the target identity before she receives the system parameter of target RHIBE scheme. In this paper, we propose the first RHIBE construction that achieves a right security notion, called adaptive-ID security. In particular, our construction still has the advantages of the Seo-Emura RHIBE schemes; that is, it is scalable and achieves history-free update, security against insiders, and short ciphertexts. We employ the dual system encryption methodology.

Original languageEnglish
Title of host publicationAdvances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings
EditorsKeisuke Tanaka, Yuji Suga
PublisherSpringer Verlag
Pages21-38
Number of pages18
ISBN (Print)9783319224244
DOIs
StatePublished - 2015 Jan 1
Event10th International Workshop on Security, IWSEC 2015 - Nara, Japan
Duration: 2015 Aug 262015 Aug 28

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9241
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other10th International Workshop on Security, IWSEC 2015
CountryJapan
CityNara
Period15/08/2615/08/28

Fingerprint

Identity-based Encryption
Cryptography
Revocation
Target
Security Model
Encryption
Choose
Update
Methodology

Cite this

Seo, J. H., & Emura, K. (2015). Adaptive-ID secure revocable hierarchical identity-based encryption. In K. Tanaka, & Y. Suga (Eds.), Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings (pp. 21-38). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9241). Springer Verlag. https://doi.org/10.1007/978-3-319-22425-1_2
Seo, Jae Hong ; Emura, Keita. / Adaptive-ID secure revocable hierarchical identity-based encryption. Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings. editor / Keisuke Tanaka ; Yuji Suga. Springer Verlag, 2015. pp. 21-38 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{7bcd38052acf4fe18f712c5d6ffac30c,
title = "Adaptive-ID secure revocable hierarchical identity-based encryption",
abstract = "Revocable Hierarchical Identity-Based Encryption (RHIBE) is a variant of Identity-Based Encryption (IBE), which enables the dynamic user management; a Key Generation Center (KGC) of a usual IBE has a key issuing ability. In contrast, in a RHIBE, a KGC can revoke compromised secret keys and even delegate both key issuing ability and revocation ability. Recently, Seo and Emura proposed the first construction for RHIBE (CT-RSA 2013) and then refined the security model and the construction for RHIBE (CT-RSA 2015). Nevertheless, their constructions achieve only a slightly weaker security notion, called selective-ID security, in the sense that the adversary has to choose and declare the target identity before she receives the system parameter of target RHIBE scheme. In this paper, we propose the first RHIBE construction that achieves a right security notion, called adaptive-ID security. In particular, our construction still has the advantages of the Seo-Emura RHIBE schemes; that is, it is scalable and achieves history-free update, security against insiders, and short ciphertexts. We employ the dual system encryption methodology.",
author = "Seo, {Jae Hong} and Keita Emura",
year = "2015",
month = "1",
day = "1",
doi = "10.1007/978-3-319-22425-1_2",
language = "English",
isbn = "9783319224244",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "21--38",
editor = "Keisuke Tanaka and Yuji Suga",
booktitle = "Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings",

}

Seo, JH & Emura, K 2015, Adaptive-ID secure revocable hierarchical identity-based encryption. in K Tanaka & Y Suga (eds), Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9241, Springer Verlag, pp. 21-38, 10th International Workshop on Security, IWSEC 2015, Nara, Japan, 15/08/26. https://doi.org/10.1007/978-3-319-22425-1_2

Adaptive-ID secure revocable hierarchical identity-based encryption. / Seo, Jae Hong; Emura, Keita.

Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings. ed. / Keisuke Tanaka; Yuji Suga. Springer Verlag, 2015. p. 21-38 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9241).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Adaptive-ID secure revocable hierarchical identity-based encryption

AU - Seo, Jae Hong

AU - Emura, Keita

PY - 2015/1/1

Y1 - 2015/1/1

N2 - Revocable Hierarchical Identity-Based Encryption (RHIBE) is a variant of Identity-Based Encryption (IBE), which enables the dynamic user management; a Key Generation Center (KGC) of a usual IBE has a key issuing ability. In contrast, in a RHIBE, a KGC can revoke compromised secret keys and even delegate both key issuing ability and revocation ability. Recently, Seo and Emura proposed the first construction for RHIBE (CT-RSA 2013) and then refined the security model and the construction for RHIBE (CT-RSA 2015). Nevertheless, their constructions achieve only a slightly weaker security notion, called selective-ID security, in the sense that the adversary has to choose and declare the target identity before she receives the system parameter of target RHIBE scheme. In this paper, we propose the first RHIBE construction that achieves a right security notion, called adaptive-ID security. In particular, our construction still has the advantages of the Seo-Emura RHIBE schemes; that is, it is scalable and achieves history-free update, security against insiders, and short ciphertexts. We employ the dual system encryption methodology.

AB - Revocable Hierarchical Identity-Based Encryption (RHIBE) is a variant of Identity-Based Encryption (IBE), which enables the dynamic user management; a Key Generation Center (KGC) of a usual IBE has a key issuing ability. In contrast, in a RHIBE, a KGC can revoke compromised secret keys and even delegate both key issuing ability and revocation ability. Recently, Seo and Emura proposed the first construction for RHIBE (CT-RSA 2013) and then refined the security model and the construction for RHIBE (CT-RSA 2015). Nevertheless, their constructions achieve only a slightly weaker security notion, called selective-ID security, in the sense that the adversary has to choose and declare the target identity before she receives the system parameter of target RHIBE scheme. In this paper, we propose the first RHIBE construction that achieves a right security notion, called adaptive-ID security. In particular, our construction still has the advantages of the Seo-Emura RHIBE schemes; that is, it is scalable and achieves history-free update, security against insiders, and short ciphertexts. We employ the dual system encryption methodology.

UR - http://www.scopus.com/inward/record.url?scp=84944810332&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-22425-1_2

DO - 10.1007/978-3-319-22425-1_2

M3 - Conference contribution

AN - SCOPUS:84944810332

SN - 9783319224244

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 21

EP - 38

BT - Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings

A2 - Tanaka, Keisuke

A2 - Suga, Yuji

PB - Springer Verlag

ER -

Seo JH, Emura K. Adaptive-ID secure revocable hierarchical identity-based encryption. In Tanaka K, Suga Y, editors, Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings. Springer Verlag. 2015. p. 21-38. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-22425-1_2