Revocable Identity-based encryption from the Computational Diffie-Hellman problem

Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2 Citations (Scopus)

Abstract

An Identity-based encryption (IBE) simplifies key management by taking users’ identities as public keys. However, how to dynamically revoke users in an IBE scheme is not a trivial problem. To solve this problem, IBE scheme with revocation (namely revocable IBE scheme) has been proposed. Apart from those lattice-based IBE, most of the existing schemes are based on decisional assumptions over pairing-groups. In this paper, we propose a revocable IBE scheme based on a weaker assumption, namely Computational Diffie-Hellman (CDH) assumption over non-pairing groups. Our revocable IBE scheme was inspired by the IBE scheme proposed by Döttling and Garg in Crypto2017. Like Döttling and Garg’s IBE scheme, the key authority maintains a complete binary tree where every user is assigned to a leaf node. To adapt such an IBE scheme to a revocable IBE, we update the nodes along the paths of the revoked users in each time slot. Upon this updating, all revoked users are forced to be equipped with new encryption keys but without decryption keys, thus they are unable to perform decryption any more. We proved that our revocable IBE is adaptive IND-ID-CPA secure in the standard model. Our scheme serves as the first revocable IBE scheme from the CDH assumption. Moreover, the size of updating key in each time slot is only related to the number of newly revoked users in the past time slot.

Original languageEnglish
Title of host publicationInformation Security and Privacy
Subtitle of host publication23rd Australasian Conference, ACISP 2018 Wollongong, NSW, Australia, July 11–13, 2018 Proceedings
EditorsWilly Susilo, Guomin Yang
Place of PublicationCham Switzerland
PublisherSpringer
Pages265-283
Number of pages19
ISBN (Electronic)9783319936383
ISBN (Print)9783319936376
DOIs
Publication statusPublished - 2018
EventAustralasian Conference on Information Security and Privacy 2018 - Wollongong, Australia
Duration: 11 Jul 201813 Jul 2018
Conference number: 23rd
https://ssl.informatics.uow.edu.au/acisp2018/ (Website)
https://link.springer.com/book/10.1007/978-3-319-93638-3 (Proceedings)

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume10946
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceAustralasian Conference on Information Security and Privacy 2018
Abbreviated titleACISP 2018
CountryAustralia
CityWollongong
Period11/07/1813/07/18
Internet address

Keywords

  • CDH assumption
  • Revocable identity-based encryption

Cite this