A Remark on "Efficient Revocable ID-Based Encryption with a Public Channel"

被引:3
|
作者
Seo, Jae Hong [1 ]
Emura, Keita [2 ]
机构
[1] Myongji Univ, Dept Math, Yongin 449728, Gyeonggi Do, South Korea
[2] Natl Inst Informat & Commun Technol NICT, Network Secur Res Inst, Koganei, Tokyo 1848795, Japan
关键词
revocable identity-based encryption; scalability; decryption key exposure resilience;
D O I
10.1587/transfun.E96.A.2282
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In 2001, Boneh and Franklin realized the first Identity-Based Encryption (IBE), and at the same time they proposed a simple way to revoke users from the system. Later, Boldyreva et al. pointed out that Boneh-Franklin's revocation method is not scalable well and they proposed the first IBE scheme with efficient revocation. Recently, Tseng and Tsai [Computer Journal, Vol.55 No.4, page 475-486, 2012] claimed that Boldyreva et al.'s scheme requires a secure channel between each user and the key generation center in the key update phase, and proposed a new revocable IBE (RISE) with a public channel by extending the Boneh-Franklin scheme. In this paper, we revisit Tseng and Tsai's result; we first point out that secure channels (except for the initial key setup) are not mandatory in the definition of RIBE scheme formalized by Boldyreva et al. Next, we show that Boldyreva et al.'s scheme does not require any secure channels (except for the initial key setup), which is different from what Tseng and Tsai claimed and so invalidates their contribution of the first RIBE with a public channel. Moreover, we point out that there are simple techniques to remove secure channels from the Boneh-Franklin RIBE. Interestingly, we show that the secure-channel-free Boneh-Franklin RIBE scheme is secure against decryption key exposure, whereas the Tseng-Tsai RIBE scheme is vulnerable to this attack.
引用
收藏
页码:2282 / 2285
页数:4
相关论文
共 50 条
  • [21] Efficient ID-based multi-decrypter encryption with short ciphertexts
    Chai, Zhen-Chuan
    Cao, Zhen-Fu
    Zhou, Yuan
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 103 - 108
  • [22] Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts
    Zhen-Chuan Chai
    Zhen-Fu Cao
    Yuan Zhou
    Journal of Computer Science and Technology, 2007, 22 : 103 - 108
  • [23] Provably secure revocable ID-based signature in the standard model
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (10) : 1250 - 1260
  • [24] Revocable ID-Based Signature with Short Size over Lattices
    Hung, Ying-Hao
    Tseng, Yuh-Min
    Huang, Sen-Shan
    SECURITY AND COMMUNICATION NETWORKS, 2017, : 1 - 9
  • [25] Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city
    Lai, Jianchang
    Mu, Yi
    Guo, Fuchun
    Susilo, Willy
    Chen, Rongmao
    PERSONAL AND UBIQUITOUS COMPUTING, 2017, 21 (05) : 855 - 868
  • [26] Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city
    Jianchang Lai
    Yi Mu
    Fuchun Guo
    Willy Susilo
    Rongmao Chen
    Personal and Ubiquitous Computing, 2017, 21 : 855 - 868
  • [27] A proposal of efficient scheme of key management using ID-based encryption and biometrics
    Izumi, Akitoshi
    Ueshige, Yoshifumi
    Sakurai, Kouichi
    MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 29 - +
  • [28] ID-based key agreement for multimedia encryption
    Yi, X
    Tan, CH
    Siew, CK
    Syed, MR
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2002, 48 (02) : 298 - 303
  • [29] Group ID-Based Encryption with Equality Test
    Ling, Yunhao
    Ma, Sha
    Huang, Qiong
    Xiang, Ru
    Li, Ximing
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 39 - 57
  • [30] A new ID-based broadcast encryption scheme
    Yang, Chen
    Cheng, Xiangguo
    Ma, Wenping
    Wang, Xinmei
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 487 - 492