A Remark on "Efficient Revocable ID-Based Encryption with a Public Channel"

被引:3
|
作者
Seo, Jae Hong [1 ]
Emura, Keita [2 ]
机构
[1] Myongji Univ, Dept Math, Yongin 449728, Gyeonggi Do, South Korea
[2] Natl Inst Informat & Commun Technol NICT, Network Secur Res Inst, Koganei, Tokyo 1848795, Japan
关键词
revocable identity-based encryption; scalability; decryption key exposure resilience;
D O I
10.1587/transfun.E96.A.2282
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In 2001, Boneh and Franklin realized the first Identity-Based Encryption (IBE), and at the same time they proposed a simple way to revoke users from the system. Later, Boldyreva et al. pointed out that Boneh-Franklin's revocation method is not scalable well and they proposed the first IBE scheme with efficient revocation. Recently, Tseng and Tsai [Computer Journal, Vol.55 No.4, page 475-486, 2012] claimed that Boldyreva et al.'s scheme requires a secure channel between each user and the key generation center in the key update phase, and proposed a new revocable IBE (RISE) with a public channel by extending the Boneh-Franklin scheme. In this paper, we revisit Tseng and Tsai's result; we first point out that secure channels (except for the initial key setup) are not mandatory in the definition of RIBE scheme formalized by Boldyreva et al. Next, we show that Boldyreva et al.'s scheme does not require any secure channels (except for the initial key setup), which is different from what Tseng and Tsai claimed and so invalidates their contribution of the first RIBE with a public channel. Moreover, we point out that there are simple techniques to remove secure channels from the Boneh-Franklin RIBE. Interestingly, we show that the secure-channel-free Boneh-Franklin RIBE scheme is secure against decryption key exposure, whereas the Tseng-Tsai RIBE scheme is vulnerable to this attack.
引用
收藏
页码:2282 / 2285
页数:4
相关论文
共 50 条
  • [1] Efficient Revocable ID-Based Encryption with a Public Channel
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    COMPUTER JOURNAL, 2012, 55 (04): : 475 - 486
  • [2] Efficient revocable ID-based encryption with cloud revocation server
    Jia, Xiaoying
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    He, Debiao
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (01)
  • [3] Efficient Revocable Multi-Receiver ID-Based Encryption
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (02): : 159 - 169
  • [4] A Fully Secure Revocable ID-Based Encryption in the Standard Model
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    INFORMATICA, 2012, 23 (03) : 487 - 505
  • [5] RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBE
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    INFORMATICA, 2014, 25 (02) : 299 - 326
  • [6] Efficient hybrid encryption from ID-based encryption
    Masayuki Abe
    Yang Cui
    Hideki Imai
    Eike Kiltz
    Designs, Codes and Cryptography, 2010, 54 : 205 - 240
  • [7] Efficient hybrid encryption from ID-based encryption
    Abe, Masayuki
    Cui, Yang
    Imai, Hideki
    Kiltz, Eike
    DESIGNS CODES AND CRYPTOGRAPHY, 2010, 54 (03) : 205 - 240
  • [8] Efficient Revocable ID-Based Signature With Cloud Revocation Server
    Jia, Xiaoying
    He, Debiao
    Zeadally, Sherali
    Li, Li
    IEEE ACCESS, 2017, 5 : 2945 - 2954
  • [9] Revocable ID-based signcryption scheme
    Liu, Zhenhua
    Li, Juanjuan
    Zu, Longhui
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (02): : 79 - 86
  • [10] Efficient searchable ID-based encryption with a designated server
    Wu, Tsu-Yang
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    ANNALS OF TELECOMMUNICATIONS, 2014, 69 (7-8) : 391 - 402