Detailed Information

Cited 31 time in webofscience Cited 33 time in scopus
Metadata Downloads

Revocable Identity-Based Cryptosystem Revisited: Security Models and Constructions

Full metadata record
DC Field Value Language
dc.contributor.authorSeo, JaeHong-
dc.contributor.authorEmura, Keita-
dc.date.accessioned2022-07-07T13:32:48Z-
dc.date.available2022-07-07T13:32:48Z-
dc.date.created2021-05-13-
dc.date.issued2014-07-
dc.identifier.issn1556-6013-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/144591-
dc.description.abstractBoneh and Franklin gave a naive revocation method in identity-based encryption (IBE) which imposes a huge overhead into the key generation center. Later, Boldyreva, Goyal, and Kumar proposed an elegant way of achieving an IBE with efficient revocation, called revocable IBE (RIBE). In this paper, we revisit RIBE from the viewpoint of both security models and constructions. First, we introduce a realistic threat, which we call decryption key exposure, and show that all prior RIBE constructions, except the Boneh-Franklin one, are vulnerable to decryption key exposure. Next, we propose the first scalable RIBE scheme with decryption key exposure resistance by combining the (adaptively secure) Waters IBE scheme and the (selectively secure) Boneh-Boyen IBE scheme, and show that our RIBE scheme is more efficient than all previous adaptively secure scalable RIBE schemes. In addition, we extend our interest into identity-based signatures; we introduce a new security definition of revocable identity-based signature (RIBS) with signing key exposure resistance, and propose the first scalable RIBS scheme based on the Paterson-Schuldt IBS. Finally, we provide implementation results of our schemes to adduce the feasibility of our schemes.-
dc.language영어-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleRevocable Identity-Based Cryptosystem Revisited: Security Models and Constructions-
dc.typeArticle-
dc.contributor.affiliatedAuthorSeo, JaeHong-
dc.identifier.doi10.1109/TIFS.2014.2327758-
dc.identifier.scopusid2-s2.0-84903149004-
dc.identifier.wosid000338111700005-
dc.identifier.bibliographicCitationIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.9, pp.1193 - 1205-
dc.relation.isPartOfIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY-
dc.citation.titleIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY-
dc.citation.volume9-
dc.citation.startPage1193-
dc.citation.endPage1205-
dc.type.rimsART-
dc.type.docType정기학술지(Article(Perspective Article포함))-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordPlusIdentity Based Encryption-
dc.subject.keywordPlusIdentity based signature-
dc.subject.keywordPlusIdentity-based cryptosystem-
dc.subject.keywordPlusKey exposure-
dc.subject.keywordPlusKey generation centers-
dc.subject.keywordPlusRevocation methods-
dc.subject.keywordPlusSecurity definitions-
dc.subject.keywordPlusSecurity model-
dc.subject.keywordAuthordecryption/signing key exposure-
dc.subject.keywordAuthorIdentity-based encryption/signature withrevocation-
dc.identifier.urlhttps://ieeexplore.ieee.org/document/6824197-
Files in This Item
Go to Link
Appears in
Collections
서울 자연과학대학 > 서울 수학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Seo, Jae Hong photo

Seo, Jae Hong
COLLEGE OF NATURAL SCIENCES (DEPARTMENT OF MATHEMATICS)
Read more

Altmetrics

Total Views & Downloads

BROWSE