170 Hits in 5.6 sec

Adaptively Secure Revocable Hierarchical IBE from k-linear Assumption [article]

Keita Emura, Atsushi Takayasu, Yohei Watanabe
2020 IACR Cryptology ePrint Archive  
Thus, we obtain the first RHIBE schemes with the adaptive security under the standard k-linear assumption. We prove the adaptive security by developing a new proof technique of RHIBE.  ...  Revocable hierarchical IBE (RHIBE) is its further extension with a key delegation functionality.  ...  Therefore, we obtain the first adaptively secure RHIBE schemes with the stronger DKER from the standard k-linear assumption in the standard model based on [CG17, CW14, GCTC16] .  ... 
dblp:journals/iacr/EmuraTW20 fatcat:6f2l5wwmcnc7xcicm7f54nmfba

Cost-Effective Authentic and Anonymous Data Sharing with Forward Security

Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou
2015 IEEE transactions on computers  
To this end, we propose a notion called revocable-storage identity-based encryption (RS-IBE), which can provide the forward/backward security of ciphertext by introducing the functionalities of user revocation  ...  That is, when some user's authorization is expired, there should be a mechanism that can remove him/her from the system.  ...  Furthermore, a concrete construction of RS-IBE is presented. The proposed RS-IBE scheme is proved adaptive-secure in the standard model, under the decisional ℓ-DBHE assumption.  ... 
doi:10.1109/tc.2014.2315619 fatcat:w626ohmwe5ajlbenbldmryu2rq

A generic construction for revocable identity-based encryption with subset difference methods

Kwangsu Lee
2020 PLoS ONE  
If the underlying IBE, IBR, and HIBE schemes are adaptively (or selectively) secure, then our RIBE scheme is also adaptively (or selectively) secure.  ...  Recently, Ma and Lin proposed a generic method of designing a revocable IBE (RIBE) scheme that uses the complete subtree (CS) method by combining IBE and hierarchical IBE (HIBE) schemes.  ...  To this security, we use the IBE scheme of Waters [30] which provides adaptive security under the DBDH and DLIN assumptions, the IBR scheme of Okamoto and Takashima [39] which is derived from an NIPE  ... 
doi:10.1371/journal.pone.0239053 pmid:32946491 fatcat:gjfymj3b7falfpssb65folbxgq

Generic Constructions of Revocable Hierarchical Identity-based Encryption [article]

Keita Emura, Atsushi Takayasu, Yohei Watanabe
2021 IACR Cryptology ePrint Archive  
tightly secure RHIBE schemes under the k-linear assumption.  ...  Revocable hierarchical identity-based encryption (RHIBE) is an extension of hierarchical identity-based encryption (HIBE) supporting the key revocation mechanism.  ...  Furthermore, [23, 24, 25] achieve almost tight security under the k-linear assumption.  ... 
dblp:journals/iacr/EmuraTW21 fatcat:3sv5xklrynh7tc56o2dkdip3ki

Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption

Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph Liu
2018 Cryptography  
We prove that our revocable IBE is adaptive IND-ID-CPA secure in the standard model. Our scheme serves as the first revocable IBE scheme from the CDH assumption.  ...  Apart from those lattice-based IBE, most of the existing schemes are based on decisional assumptions over pairing-groups.  ...  If HIBE is the hierarchal IBE constructed in [8] , the above server-aided revocable IBE scheme Σ is selective-SR-ID-CPA secure (with decryption key exposure resistance ) based on the CDH assumption.  ... 
doi:10.3390/cryptography2040033 fatcat:gn77hqygnvcfhnhvacbvft7tvu

Generic Constructions of RIBE via Subset Difference Method [article]

Xuecheng Ma, Dongdai Lin
2019 IACR Cryptology ePrint Archive  
Revocable identity-based encryption (RIBE) is an extension of IBE which can support a key revocation mechanism, and it is important when deploying an IBE system in practice.  ...  The first generic construction of RIBE is presented by Ma and Lin with complete subtree (CS) method by combining IBE and hierarchical IBE (HIBE) schemes.  ...  When we put the results for two types of adversary together, we can conclude that the revocable IBE is adaptive-ID secure if both the underlying IBE and HIBE schemes are adaptive-ID secure.  ... 
dblp:journals/iacr/MaL19a fatcat:spu7cgefmbfiphuzsb5sitdf6i

Server-Aided Revocable Identity-Based Encryption from Lattices [chapter]

Khoa Nguyen, Huaxiong Wang, Juanyang Zhang
2016 Lecture Notes in Computer Science  
s work, we design the first SR-IBE scheme from lattice assumptions. Our scheme is more efficient than existing constructions of lattice-based revocable IBE.  ...  s IBE [1] and the CS method to construct the first revocable IBE from lattices, which satisfies selective security in the standard model.  ...  The security proof can be easily adapted to handle the multi-bit case, based on the techniques from [16, 1] . We thus have the following theorem. Theorem 2 (Adapted from [11] ).  ... 
doi:10.1007/978-3-319-48965-0_7 fatcat:2m2au6tqvrhgdiato6wyj6eslq

RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBE

Tung-Tso TSAI, Yuh-Min TSENG, Tsu-Yang WU
2014 Informatica  
keys using secure channels by contacting their ancestors in hierarchical structures.  ...  Up to now, there was very little work on studying the revocation problem in existing hierarchical ID-based encryption (HIBE) systems.  ...  s scheme to present another IBE scheme with efficient revocation that is proven adaptively secure in the standard model.  ... 
doi:10.15388/informatica.2014.16 fatcat:7eaihyb7fneqvd3ipt3mx5pm2y

Compact Group Signatures Without Random Oracles [chapter]

Xavier Boyen, Brent Waters
2006 Lecture Notes in Computer Science  
We achieve this result by combining provably secure hierarchical signatures in bilinear groups with a novel adaptation of the recent Non-Interactive Zero Knowledge proofs of Groth, Ostrovsky, and Sahai  ...  First, we derive our underlying signature scheme from the Waters [Wat05] signature scheme that was proven secure under the computational Diffie-Hellman assumption in bilinear groups.  ...  The scheme's existential unforgeability against adaptive chosen message attacks follows more or less directly from the adaptive-ID security of the Waters IBE, although it relies on a weaker assumption.  ... 
doi:10.1007/11761679_26 fatcat:2npt2zhwznhrpdzo27zgheltse

Scalable Group Signatures with Revocation [chapter]

Benoît Libert, Thomas Peters, Moti Yung
2012 Lecture Notes in Computer Science  
In the standard model, the situation is even worse as many existing solutions are not readily adaptable.  ...  The recent years saw the appearance of several constructions with security proofs in the standard model (i.e., without appealing to the random oracle heuristic).  ...  In addition, we would like to save unrevoked users from having to update their keys after each revocation. To this end, it seems possible to adapt the approach of Nakanishi et al.  ... 
doi:10.1007/978-3-642-29011-4_36 fatcat:f2mbgjgysrhqhj3ymvsezfh3ty

JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT [article]

Sam Kumar, Yuncong Hu, Michael P Andersen, Raluca Ada Popa, David E. Culler
2020 arXiv   pre-print
As the Internet of Things (IoT) emerges over the next decade, developing secure communication for IoT devices is of paramount importance.  ...  We would also like to thank students from the RISE Security Group and BETS Research Group for giving us feedback on early drafts of this paper.  ...  from the Sloan Foundation, Hellman Fellows Fund, Alibaba, Amazon, Ant Financial, Arm, Capital One, Ericsson, Facebook, Google, Intel, Microsoft, Scotiabank, Splunk and VMware.  ... 
arXiv:1905.13369v2 fatcat:ztf2h7zw5vgglgcr3an7px64b4

Revocable Key-Aggregate Cryptosystem for Data Sharing in Cloud

Qingqing Gan, Xiaoming Wang, Daini Wu
2017 Security and Communication Networks  
Finally, the proposed scheme can be proved to be selective chosen-plaintext security in the standard model.  ...  Therefore, according to the characteristics of cloud storage, a revocable key-aggregate encryption scheme is put forward based on subset-cover framework.  ...  This work was also supported by the Zhuhai Top Discipline-Information Security.  ... 
doi:10.1155/2017/2508693 fatcat:fo2vp6pafjdddl3z7wbiz724xi

Adaptive-ID Secure Revocable Identity-Based Encryption [chapter]

Benoît Libert, Damien Vergnaud
2009 Lecture Notes in Computer Science  
In this work, we describe an adaptive-ID secure revocable IBE scheme and thus solve a problem left open by Boldyreva et al..  ...  In their revocable IBE scheme, key updates have logarithmic (instead of linear in the original method) complexity for the trusted authority.  ...  Conclusion We showed that regular IBE schemes can be used to implement the efficient revocation mechanism suggested by Boldyreva et al. and notably provide the first adaptive-ID secure revocable IBE.  ... 
doi:10.1007/978-3-642-00862-7_1 fatcat:gxadj33ycnhpjjdbuznstwb5k4

New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters [chapter]

Yohei Watanabe, Keita Emura, Jae Hong Seo
2017 Lecture Notes in Computer Science  
of revocable IBE (RIBE).  ...  From both practical and theoretical points of views, it would be interesting to construct adaptively secure RIBE scheme with DKER and short public parameters in prime-order bilinear groups.  ...  Seo and Emura proposed an adaptively secure RIBE scheme based on the Waters IBE [Wat05] , and showed a security reduction from the Waters IBE to their RIBE scheme.  ... 
doi:10.1007/978-3-319-52153-4_25 fatcat:webqgm2njbfq5mqyhif3k4zc6e

HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing [article]

Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong H. Kang
2017 IACR Cryptology ePrint Archive  
To solve this problem, we propose a new scheme named HIR-CP-ABE, which implements hierarchical identitybased user revocation from the perceptive of encryption.  ...  In particular, the revocation is implemented by data owners directly without any help from any third party.  ...  . • We propose a new primitive named hierarchical identity revocable CP-ABE (HIR-CP-ABE) and define its security model.  ... 
dblp:journals/iacr/DongHLK17 fatcat:slka6idxmbeubptpo5xasi6qui
« Previous Showing results 1 — 15 out of 170 results