Efficient revocable identity-based encryption via subset difference methods
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Kwangsu | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.contributor.author | Park, Jong Hwan | - |
dc.date.accessioned | 2021-09-03T01:03:02Z | - |
dc.date.available | 2021-09-03T01:03:02Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2017-10 | - |
dc.identifier.issn | 0925-1022 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/82171 | - |
dc.description.abstract | Providing an efficient revocationmechanism for identity-based encryption (IBE) is very important since a user's credential (or private key) can be expired or revealed. revocable IBE (RIBE) is an extension of IBE that provides an efficient revocationmechanism. Previous RIBE schemes essentially use the complete subtree (CS) scheme ofNaor, Naor and Lotspiech (CRYPTO 2001) for key revocation. In this paper, we present a new technique for RIBE that uses the efficient subset difference (SD) scheme of Naor et al. instead of using the CS scheme to improve the size of update keys. Following our new technique, we first propose an efficient RIBE scheme in prime-order bilinear groups by combining the IBE scheme of Boneh and Boyen and the SD scheme and prove its selective security under the standard assumption. Our RIBE scheme is the first RIBE scheme in bilinear groups that has O(r) number of group elements in an update key where r is the number of revoked users. Next, we also propose another RIBE scheme in composite-order bilinear groups and prove its full security under static assumptions. Our RIBE schemes also can be integrated with the layered subset difference scheme of Halevy and Shamir (CRYPTO 2002) to reduce the size of a private key. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.subject | DUAL SYSTEM ENCRYPTION | - |
dc.subject | PREDICATE ENCRYPTION | - |
dc.subject | CERTIFICATE REVOCATION | - |
dc.subject | FUNCTIONAL ENCRYPTION | - |
dc.subject | BROADCAST | - |
dc.subject | HIBE | - |
dc.title | Efficient revocable identity-based encryption via subset difference methods | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1007/s10623-016-0287-3 | - |
dc.identifier.scopusid | 2-s2.0-84991728199 | - |
dc.identifier.wosid | 000408721500003 | - |
dc.identifier.bibliographicCitation | DESIGNS CODES AND CRYPTOGRAPHY, v.85, no.1, pp.39 - 76 | - |
dc.relation.isPartOf | DESIGNS CODES AND CRYPTOGRAPHY | - |
dc.citation.title | DESIGNS CODES AND CRYPTOGRAPHY | - |
dc.citation.volume | 85 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 39 | - |
dc.citation.endPage | 76 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Mathematics | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Mathematics, Applied | - |
dc.subject.keywordPlus | DUAL SYSTEM ENCRYPTION | - |
dc.subject.keywordPlus | PREDICATE ENCRYPTION | - |
dc.subject.keywordPlus | CERTIFICATE REVOCATION | - |
dc.subject.keywordPlus | FUNCTIONAL ENCRYPTION | - |
dc.subject.keywordPlus | BROADCAST | - |
dc.subject.keywordPlus | HIBE | - |
dc.subject.keywordAuthor | Identity-based encryption | - |
dc.subject.keywordAuthor | Revocable identity-based encryption | - |
dc.subject.keywordAuthor | Key revocation | - |
dc.subject.keywordAuthor | Subset difference method | - |
dc.subject.keywordAuthor | Bilinear maps | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.