Revocable IBE systems with almost constant-size key update

Le Su, Hoon Wei Lim, San Ling, Huaxiong Wang

Research output: Contribution to journalArticle

9 Citations (Scopus)

Abstract

Identity-based encryption (IBE) has been regarded as an attractive alternative to more conventional certificate-based public key systems. It has recently attracted not only considerable research from the academic community, but also interest from the industry and standardization bodies. However, while key revocation is a fundamental requirement to any public key systems, not much work has been done in the identity-based setting. In this paper, we continue the study of revocable IBE (RIBE) initiated by Boldyreva, Goyal, and Kumar. Their proposal of a selective secure RIBE scheme, and a subsequent construction by Libert and Vergnaud in a stronger adaptive security model are based on a binary tree approach, such that their key update size is logarithmic in the number of users. In this paper, we show that the key update size could be further reduced to constant with some small amount of auxiliary information, through a novel combination of the Lewko and Waters IBE scheme and the Camenisch, Kohlweiss, and Soriente pairing-based dynamic accumulator.

Original languageEnglish
Pages (from-to)168-185
Number of pages18
JournalLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8365 LNCS
DOIs
Publication statusPublished - 2014
Externally publishedYes
Event6th International Conference on Pairing-Based Cryptography: Pairing 2013 - Beijing, China
Duration: 22 Nov 201324 Nov 2013

Keywords

  • accumulator
  • adaptive security
  • identity-based encryption
  • public-key cryptography
  • revocation

Fingerprint Dive into the research topics of 'Revocable IBE systems with almost constant-size key update'. Together they form a unique fingerprint.

  • Cite this