347 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author서재홍-
dc.date.accessioned2018-03-26T01:41:01Z-
dc.date.available2018-03-26T01:41:01Z-
dc.date.issued2014-07-
dc.identifier.citationIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,V.9 N.7, p1193-p1205, 13p.en_US
dc.identifier.issn1556-6013-
dc.identifier.issn1556-6021-
dc.identifier.urihttp://ieeexplore.ieee.org.access.hanyang.ac.kr/document/6824197/-
dc.identifier.urihttp://hdl.handle.net/20.500.11754/52102-
dc.description.abstractBoneh and Franklin gave a naive revocation method in identity-based encryption (IBE) which imposes a huge overhead into the key generation center. Later, Boldyreva, Goyal, and Kumar proposed an elegant way of achieving an IBE with efficient revocation, called revocable IBE (RIBE). In this paper, we revisit RIBE from the viewpoint of both security models and constructions. First, we introduce a realistic threat, which we call decryption key exposure, and show that all prior RIBE constructions, except the Boneh-Franklin one, are vulnerable to decryption key exposure. Next, we propose the first scalable RIBE scheme with decryption key exposure resistance by combining the (adaptively secure) Waters IBE scheme and the (selectively secure) Boneh-Boyen IBE scheme, and show that our RIBE scheme is more efficient than all previous adaptively secure scalable RIBE schemes. In addition, we extend our interest into identity-based signatures; we introduce a new security definition of revocable identity-based signature (RIBS) with signing key exposure resistance, and propose the first scalable RIBS scheme based on the Paterson-Schuldt IBS. Finally, we provide implementation results of our schemes to adduce the feasibility of our schemes.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineersen_US
dc.subjectIdentity-based encryption/signature with revocationen_US
dc.subjectdecryption/signing key exposureen_US
dc.titleRevocable Identity-Based Cryptosystem Revisited: Security Models and Constructionsen_US
dc.typeArticleen_US
dc.identifier.doi10.1109/TIFS.2014.2327758-
dc.relation.journalIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY-
dc.contributor.googleauthorSeo, J.H.-
dc.contributor.googleauthorEmura, K.-
dc.relation.code2014041115-
dc.sector.campusS-
dc.sector.daehakCOLLEGE OF NATURAL SCIENCES[S]-
dc.sector.departmentDEPARTMENT OF MATHEMATICS-
dc.identifier.pidjaehongseo-
Appears in Collections:
COLLEGE OF NATURAL SCIENCES[S](자연과학대학) > MATHEMATICS(수학과) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE