Unbounded hierarchical identity-based encryption with efficient revocation

Geumsook Ryu, Kwangsu Lee, Seunghwan Park, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Abstract

Hierarchical identity-based encryption (HIBE) is an extension of identity-based encryption (IBE) where an identity of a user is organized as a hierarchical structure and a user can delegate the private key generation to another user. Providing a revocation mechanism for HIBE is highly necessary to keep a system securely. Revocable HIBE (RHIBE) is an HIBE scheme that can revoke a user’s private key if his credential is expired or revealed. In this paper, we first propose an unbounded HIBE scheme where the maximum hierarchy depth is not limited and prove its selective security under a q-type assumption. Next, we propose an efficient unbounded RHIBE scheme by combining our unbounded HIBE scheme and a binary tree structure, and then we prove its selective security. By presenting the unbounded RHIBE scheme, we solve the open problem of Seo and Emura in CT-RSA 2015.

Original languageEnglish
Title of host publicationInformation Security Applications - 16th International Workshop, WISA 2015, Revised Selected Papers
EditorsDooho Choi, Ho-Won Kim
PublisherSpringer Verlag
Pages122-133
Number of pages12
ISBN (Print)9783319318745
DOIs
Publication statusPublished - 2016
Event16th International Workshop on Information Security Applications, WISA 2015 - Jeju Island, Korea, Republic of
Duration: 2015 Aug 202015 Aug 22

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9503
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other16th International Workshop on Information Security Applications, WISA 2015
Country/TerritoryKorea, Republic of
CityJeju Island
Period15/8/2015/8/22

Keywords

  • Bilinear maps
  • Hierarchical identity-based encryption
  • Identity-based encryption
  • Revocation
  • Unbounded hierarchy depth

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Unbounded hierarchical identity-based encryption with efficient revocation'. Together they form a unique fingerprint.

Cite this