A Remark on "Efficient Revocable ID-Based Encryption with a Public Channel"

被引:3
|
作者
Seo, Jae Hong [1 ]
Emura, Keita [2 ]
机构
[1] Myongji Univ, Dept Math, Yongin 449728, Gyeonggi Do, South Korea
[2] Natl Inst Informat & Commun Technol NICT, Network Secur Res Inst, Koganei, Tokyo 1848795, Japan
关键词
revocable identity-based encryption; scalability; decryption key exposure resilience;
D O I
10.1587/transfun.E96.A.2282
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In 2001, Boneh and Franklin realized the first Identity-Based Encryption (IBE), and at the same time they proposed a simple way to revoke users from the system. Later, Boldyreva et al. pointed out that Boneh-Franklin's revocation method is not scalable well and they proposed the first IBE scheme with efficient revocation. Recently, Tseng and Tsai [Computer Journal, Vol.55 No.4, page 475-486, 2012] claimed that Boldyreva et al.'s scheme requires a secure channel between each user and the key generation center in the key update phase, and proposed a new revocable IBE (RISE) with a public channel by extending the Boneh-Franklin scheme. In this paper, we revisit Tseng and Tsai's result; we first point out that secure channels (except for the initial key setup) are not mandatory in the definition of RIBE scheme formalized by Boldyreva et al. Next, we show that Boldyreva et al.'s scheme does not require any secure channels (except for the initial key setup), which is different from what Tseng and Tsai claimed and so invalidates their contribution of the first RIBE with a public channel. Moreover, we point out that there are simple techniques to remove secure channels from the Boneh-Franklin RIBE. Interestingly, we show that the secure-channel-free Boneh-Franklin RIBE scheme is secure against decryption key exposure, whereas the Tseng-Tsai RIBE scheme is vulnerable to this attack.
引用
收藏
页码:2282 / 2285
页数:4
相关论文
共 50 条
  • [31] Efficient revocable identity-based encryption with short public parameters
    Emura, Keita
    Seo, Jae Hong
    Watanabe, Yohei
    THEORETICAL COMPUTER SCIENCE, 2021, 863 : 127 - 155
  • [32] Efficient Group ID-Based Encryption With Equality Test Against Insider Attack
    Ling, Yunhao
    Ma, Sha
    Huang, Qiong
    Li, Ximing
    Zhong, Yijian
    Ling, Yunzhi
    COMPUTER JOURNAL, 2021, 64 (04): : 661 - 674
  • [33] Public-key encryption from ID-based encryption without one-time signature
    Tan, Chik How
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 450 - 459
  • [34] Efficient public key encryption with revocable keyword search
    Yu, Yong
    Ni, Jianbing
    Yang, Haomiao
    Mu, Yi
    Susilo, Willy
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (02) : 466 - 472
  • [35] Strongly Secure Revocable ID-based Signature without Random Oracles
    Hung, Ying-Hao
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Huang, Sen-Shan
    INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (03): : 264 - 276
  • [36] Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group
    Wang, Xiao-Fen
    Mu, Yi
    Chen, Rongmao
    Zhang, Xiao-Song
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2016, 31 (05) : 1012 - 1027
  • [37] Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group
    Xiao-Fen Wang
    Yi Mu
    Rongmao Chen
    Xiao-Song Zhang
    Journal of Computer Science and Technology, 2016, 31 : 1012 - 1027
  • [38] Efficient ID-based public auditing for the outsourced data in cloud storage
    Zhang, Jianhong
    Dong, Qiaocui
    INFORMATION SCIENCES, 2016, 343 : 1 - 14
  • [39] An Efficient Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Jiang, Shengyi
    Wu, Jiayuan
    SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 506 - 515
  • [40] A new ID-based multi-recipient public-key encryption scheme
    Pang, L. (ljpang@mail.xidian.edu.cn), 1600, Chinese Institute of Electronics (22):