earticle

논문검색

Differentiating Technique: Constructing Efficient HIBE with Constant Size Ciphertext and Authorized Delegation

초록

영어

As Hierarchical Identity Based Encryption (HIBE) system usually maps the true institutional structure of an organization or entity relationship between objects in real world, It is important that computation & communication complexity of private key, ciphertext, cryptographic computations and so on related to an entity in the hierarchy is independent to the hierarchy depth of the entity. Moreover, key escrow problem that any non-leaf entity in a hierarchical identity based cryptosystem can derive private keys for its descendants with use of its private key should be resolved, in order to prevent any entity from behaving on behalf of its descendants. In this paper, a new technique is introduced for composing a private key for each individual entity in HIBE system by differentiating between non-local identifiers and local identifiers of the identity of the entity. That we call Identifier Discrimination. With the technique, A selective identity secure HIBE system is constructed under Decisional Bilinear Diffie-Hellman (DBDH) assumption without using random oracles, where the private key and the ciphertext consist of constant number of group elements, and decryption requires only three bilinear map computations, regardless of the identity hierarchy depth. Moreover, in contrast to previous HIBE constructions, where private key for an entity can be derived by its ancestors with direct use of their private keys, key escrow problem inherent in identity based cryptosystems is resolved in our HIBE construction. Privilege of deriving private keys for an entity can be delegated to any of its ancestors through authorization by distributing specifically crafted values to the ancestor in our HIBE system, that we call Authorized Delegation.

목차

Abstract
 1. Introduction
  1.1. Problem Formulation
  1.2. Related Work
  1.3. Our Approach
 2. Preliminaries
  2.1. Bilinear Pairings
  2.2. HIBE Systems
  2.3. Complexity Assumptions
 3. Our HIBE Construction with Constant Size Private Key and Constant Size Ciphertext
  3.1. Construction
  3.2. Correctness and Dedicated Encryption Privacy
 4. Authorized Delegation: Private Key Derivation with Authorized Secret
  4.1. Private Key – Ineligible Secret for Derivation
  4.2. Authorized Secret for Derivation
 5. Conclusion
 References

저자정보

  • Jian-Wu Zheng Institute of Electrical Engineering, Yanshan University, 066004, China, School of Transportation, Shijiazhuang Tiedao University, 050043, China
  • Jing Zhao School of Civil Engineering, Shijiazhuang Tiedao University, 050043, China
  • Xin-Ping Guan Institute of Electrical Engineering, Yanshan University, 066004, China, Department of Automation, Shanghai Jiao Tong University, 200240, China

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.