438 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author서재홍-
dc.date.accessioned2018-03-07T01:45:42Z-
dc.date.available2018-03-07T01:45:42Z-
dc.date.issued2016-02-
dc.identifier.citationTHEORETICAL COMPUTER SCIENCE, v.615, page.45-60en_US
dc.identifier.issn0304-3975-
dc.identifier.issn1879-2294-
dc.identifier.urihttps://www.sciencedirect.com/science/article/pii/S0304397515011354?via%3Dihub-
dc.identifier.urihttp://hdl.handle.net/20.500.11754/43037-
dc.description.abstractIn the context of Identity-Based Encryption (IBE), both revocation and delegation of key generation are important functionalities. Although a number of IBE schemes with either efficient revocation or efficient delegation of key generation functionality have been proposed, an important open problem is efficiently delegating both the key generation and revocation functionalities in IBE systems. Seo and Emura (2014) [25] proposed the first realization of Revocable Hierarchical IBE (RHIBE), a sole IBE scheme that achieves both functionalities simultaneously. However, their approach implements history-preserving updates, wherein a low-level user must know the history of key updates performed by ancestors in the current time period, and it renders the scheme very complex. In this paper, we present a new method to construct RHIBE that implements history free updates. Our history-free approach renders the scheme simple and efficient. As a second contribution, we redefine the security model for RHIBE to ensure security against insiders, where adversaries are allowed to obtain all internal system information, e.g., state information. In addition, we also consider the decryption key exposure attack, which was considered by Seo and Emura (2013) [23]. Further, we propose two RHIBE schemes with shorter secret keys and constant size ciphertexts that implement the aforementioned history-free updates approach and security model. For revocation, our constructions use the Complete Subtree (CS) method and the Subset Difference (SD) method. Both schemes are selectively secure in the standard model under the q-weak Bilinear Diffie-Hellman Inversion assumption. (c) 2015 Elsevier B.V. All rights reserved.en_US
dc.description.sponsorshipJae Hong Seo was supported by ETRI R&D program (15ZS1500).en_US
dc.language.isoenen_US
dc.publisherELSEVIER SCIENCE BVen_US
dc.subject(Hierarchical) identity-based encryptionen_US
dc.subjectRevocationen_US
dc.subjectDelegationen_US
dc.titleRevocable hierarchical identity-based encryption via history-free approachen_US
dc.typeArticleen_US
dc.identifier.doi10.1016/j.tcs.2015.11.047-
dc.relation.journalTHEORETICAL COMPUTER SCIENCE-
dc.contributor.googleauthorSeo, Jae Hong-
dc.contributor.googleauthorEmura, Keita-
dc.relation.code2016002626-
dc.sector.campusS-
dc.sector.daehakCOLLEGE OF NATURAL SCIENCES[S]-
dc.sector.departmentDEPARTMENT OF MATHEMATICS-
Appears in Collections:
COLLEGE OF NATURAL SCIENCES[S](자연과학대학) > MATHEMATICS(수학과) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE