Title | ||
---|---|---|
CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles |
Abstract | ||
---|---|---|
In order to mitigate the damages of key-exposure, key-insulated encryption introduces a helper key used to periodically update the decryption key. Under the usual circumstances, frequent updating increases the risk of helper key-exposure. Parallel key-insulated encryption (PKIE) supports frequent key updates without increasing the risk of helper key-exposure. In an identity-based cryptosystem, a private key generator (PKG) uses a master secret key to issue private keys to users based on their identities. In this paper, we propose a new identity-based parallel key-insulated encryption (IBPKIE) scheme which achieves IND-ID-KI-CCA2 security without random oracles. Our IBPKIE scheme has short public parameters and a tight reduction with an additive factor. Hierarchical identity-based cryptography was first proposed in 2002. It allows a root PKG to distribute workload by delegating private key generation and entity authentication tasks to lower-level PKGs. In this paper, we formalize the syntax and security model for a hierarchical identity-based parallel key-insulated encryption (HIBPKIE) scheme. We then propose an HIBPKIE scheme with constant size ciphertext, and prove that it achieves IND-ID-KI-CCA2 security without random oracles. To the best of our knowledge, this is the first HIBPKIE scheme up to now. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1016/j.jss.2009.07.046 | Journal of Systems and Software |
Keywords | Field | DocType |
frequent key updates,decryption key,hierarchical,private key,helper key,identity-based,identity-based parallel key-insulated encryption,parallel key-insulated encryption,without random oracles,ind-id-ki-cca2 security,helper key-exposure,random oracle,master secret key,hibpkie scheme,security model | Key distribution,Computer science,Computer security,Deterministic encryption,Attribute-based encryption,Plaintext-aware encryption,Theoretical computer science,Real-time computing,Encryption,40-bit encryption,Probabilistic encryption,On-the-fly encryption | Journal |
Volume | Issue | ISSN |
83 | 1 | The Journal of Systems & Software |
Citations | PageRank | References |
4 | 0.42 | 16 |
Authors | ||
2 |