1. Efficient revocable hierarchical identity-based encryption using cryptographic accumulators
- Author
-
Julong Lan, Hongyong Jia, Yue Chen, Jun Wang, and Kaixiang Huang
- Subjects
Theoretical computer science ,Computer Networks and Communications ,business.industry ,Computer science ,Client-side encryption ,0102 computer and information sciences ,02 engineering and technology ,Encryption ,computer.software_genre ,01 natural sciences ,Multiple encryption ,010201 computation theory & mathematics ,Probabilistic encryption ,0202 electrical engineering, electronic engineering, information engineering ,40-bit encryption ,56-bit encryption ,020201 artificial intelligence & image processing ,Attribute-based encryption ,On-the-fly encryption ,Safety, Risk, Reliability and Quality ,business ,computer ,Software ,Information Systems - Abstract
Hierarchical identity-based encryption is an important extension from IBE and has found many applications in the network world. Private key revocation is a crucial requirement for any public key system. In this paper, we propose a novel revocation method for the hierarchical identity-based encryption. Existing revocable hierarchical identity-based encryption schemes have several disadvantages: the key update size increases logarithmically with the number of users in the system, the public information of key update received by each user is different and always related to the level of the identity hierarchy and the security proof of the revocable scheme is very complex. In our scheme, cryptographic accumulators are used to compress hierarchical levels and revoked users’ information into constant values. So we achieve almost constant size of private key update which is irrelevant with the user number in the system. Because of the compression of hierarchical information we can use simple dual system encryption techniques to prove our scheme to be fully secure under several common assumptions without resorting to complex nested dual system encryption techniques.
- Published
- 2017
- Full Text
- View/download PDF