Revocable Identity-Based Cryptosystem Revisited: Security Models and Constructions
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Seo, JaeHong | - |
dc.contributor.author | Emura, Keita | - |
dc.date.accessioned | 2022-07-07T13:32:48Z | - |
dc.date.available | 2022-07-07T13:32:48Z | - |
dc.date.created | 2021-05-13 | - |
dc.date.issued | 2014-07 | - |
dc.identifier.issn | 1556-6013 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/144591 | - |
dc.description.abstract | Boneh and Franklin gave a naive revocation method in identity-based encryption (IBE) which imposes a huge overhead into the key generation center. Later, Boldyreva, Goyal, and Kumar proposed an elegant way of achieving an IBE with efficient revocation, called revocable IBE (RIBE). In this paper, we revisit RIBE from the viewpoint of both security models and constructions. First, we introduce a realistic threat, which we call decryption key exposure, and show that all prior RIBE constructions, except the Boneh-Franklin one, are vulnerable to decryption key exposure. Next, we propose the first scalable RIBE scheme with decryption key exposure resistance by combining the (adaptively secure) Waters IBE scheme and the (selectively secure) Boneh-Boyen IBE scheme, and show that our RIBE scheme is more efficient than all previous adaptively secure scalable RIBE schemes. In addition, we extend our interest into identity-based signatures; we introduce a new security definition of revocable identity-based signature (RIBS) with signing key exposure resistance, and propose the first scalable RIBS scheme based on the Paterson-Schuldt IBS. Finally, we provide implementation results of our schemes to adduce the feasibility of our schemes. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | Revocable Identity-Based Cryptosystem Revisited: Security Models and Constructions | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Seo, JaeHong | - |
dc.identifier.doi | 10.1109/TIFS.2014.2327758 | - |
dc.identifier.scopusid | 2-s2.0-84903149004 | - |
dc.identifier.wosid | 000338111700005 | - |
dc.identifier.bibliographicCitation | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.9, pp.1193 - 1205 | - |
dc.relation.isPartOf | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | - |
dc.citation.title | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | - |
dc.citation.volume | 9 | - |
dc.citation.startPage | 1193 | - |
dc.citation.endPage | 1205 | - |
dc.type.rims | ART | - |
dc.type.docType | 정기학술지(Article(Perspective Article포함)) | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordPlus | Identity Based Encryption | - |
dc.subject.keywordPlus | Identity based signature | - |
dc.subject.keywordPlus | Identity-based cryptosystem | - |
dc.subject.keywordPlus | Key exposure | - |
dc.subject.keywordPlus | Key generation centers | - |
dc.subject.keywordPlus | Revocation methods | - |
dc.subject.keywordPlus | Security definitions | - |
dc.subject.keywordPlus | Security model | - |
dc.subject.keywordAuthor | decryption/signing key exposure | - |
dc.subject.keywordAuthor | Identity-based encryption/signature withrevocation | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/6824197 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.