Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 서재홍 | - |
dc.date.accessioned | 2018-03-26T01:41:01Z | - |
dc.date.available | 2018-03-26T01:41:01Z | - |
dc.date.issued | 2014-07 | - |
dc.identifier.citation | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,V.9 N.7, p1193-p1205, 13p. | en_US |
dc.identifier.issn | 1556-6013 | - |
dc.identifier.issn | 1556-6021 | - |
dc.identifier.uri | http://ieeexplore.ieee.org.access.hanyang.ac.kr/document/6824197/ | - |
dc.identifier.uri | http://hdl.handle.net/20.500.11754/52102 | - |
dc.description.abstract | Boneh and Franklin gave a naive revocation method in identity-based encryption (IBE) which imposes a huge overhead into the key generation center. Later, Boldyreva, Goyal, and Kumar proposed an elegant way of achieving an IBE with efficient revocation, called revocable IBE (RIBE). In this paper, we revisit RIBE from the viewpoint of both security models and constructions. First, we introduce a realistic threat, which we call decryption key exposure, and show that all prior RIBE constructions, except the Boneh-Franklin one, are vulnerable to decryption key exposure. Next, we propose the first scalable RIBE scheme with decryption key exposure resistance by combining the (adaptively secure) Waters IBE scheme and the (selectively secure) Boneh-Boyen IBE scheme, and show that our RIBE scheme is more efficient than all previous adaptively secure scalable RIBE schemes. In addition, we extend our interest into identity-based signatures; we introduce a new security definition of revocable identity-based signature (RIBS) with signing key exposure resistance, and propose the first scalable RIBS scheme based on the Paterson-Schuldt IBS. Finally, we provide implementation results of our schemes to adduce the feasibility of our schemes. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers | en_US |
dc.subject | Identity-based encryption/signature with revocation | en_US |
dc.subject | decryption/signing key exposure | en_US |
dc.title | Revocable Identity-Based Cryptosystem Revisited: Security Models and Constructions | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/TIFS.2014.2327758 | - |
dc.relation.journal | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | - |
dc.contributor.googleauthor | Seo, J.H. | - |
dc.contributor.googleauthor | Emura, K. | - |
dc.relation.code | 2014041115 | - |
dc.sector.campus | S | - |
dc.sector.daehak | COLLEGE OF NATURAL SCIENCES[S] | - |
dc.sector.department | DEPARTMENT OF MATHEMATICS | - |
dc.identifier.pid | jaehongseo | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.