New Constructions of Revocable Identity-Based Encryption From Multilinear Maps
- Authors
- Park, Seunghwan; Lee, Kwangsu; Lee, Dong Hoon
- Issue Date
- 8월-2015
- Publisher
- IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
- Keywords
- Identity-based encryption; key revocation; broadcast encryption; multilinear maps
- Citation
- IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.10, no.8, pp.1564 - 1577
- Indexed
- SCIE
SCOPUS
- Journal Title
- IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
- Volume
- 10
- Number
- 8
- Start Page
- 1564
- End Page
- 1577
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/92912
- DOI
- 10.1109/TIFS.2015.2419180
- ISSN
- 1556-6013
- Abstract
- A revocable identity-based encryption (RIBE) provides an efficient revocation method in IBE that a trusted authority periodically broadcasts an update key for nonrevoked users and a user can decrypt a ciphertext if he is not revoked in the update key. Boldyreva, Goyal, and Kumar (CCS 2008) defined RIBE and proposed an RIBE scheme that uses a tree-based revocation encryption scheme to revoke users' private keys. In this paper, we devise a new technique for RIBE and propose RIBE schemes with a constant number of private key elements. We achieve the following results. We first devise a new technique for RIBE that combines a hierarchical IBE (HIBE) scheme and a public-key broadcast encryption (PKBE) scheme using multilinear maps. In contrast to the previous technique for RIBE, our technique uses a PKBE scheme in bilinear maps for revocation to achieve short private keys and update keys. Following our new technique for RIBE, we propose an RIBE scheme in three-leveled multilinear maps that combines the HIBE scheme of Boneh and Boyen (EUROCRYPT 2004) and the PKBE scheme of Boneh, Gentry, and Waters (CRYPTO 2005). The private key and update key of our scheme possess a constant number of group elements. Next, we propose another RIBE scheme with reduced public parameters and short keys by combining the HIBE scheme of Boneh and Boyen and the PKBE scheme of Boneh, Waters, and Zhandry (CRYPTO 2014), which uses multilinear maps. Compared with our first RIBE scheme, our second RIBE scheme requires high-leveled multilinear maps.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.