A Remark on "Efficient Revocable ID-Based Encryption with a Public Channel"

被引:3
|
作者
Seo, Jae Hong [1 ]
Emura, Keita [2 ]
机构
[1] Myongji Univ, Dept Math, Yongin 449728, Gyeonggi Do, South Korea
[2] Natl Inst Informat & Commun Technol NICT, Network Secur Res Inst, Koganei, Tokyo 1848795, Japan
关键词
revocable identity-based encryption; scalability; decryption key exposure resilience;
D O I
10.1587/transfun.E96.A.2282
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In 2001, Boneh and Franklin realized the first Identity-Based Encryption (IBE), and at the same time they proposed a simple way to revoke users from the system. Later, Boldyreva et al. pointed out that Boneh-Franklin's revocation method is not scalable well and they proposed the first IBE scheme with efficient revocation. Recently, Tseng and Tsai [Computer Journal, Vol.55 No.4, page 475-486, 2012] claimed that Boldyreva et al.'s scheme requires a secure channel between each user and the key generation center in the key update phase, and proposed a new revocable IBE (RISE) with a public channel by extending the Boneh-Franklin scheme. In this paper, we revisit Tseng and Tsai's result; we first point out that secure channels (except for the initial key setup) are not mandatory in the definition of RIBE scheme formalized by Boldyreva et al. Next, we show that Boldyreva et al.'s scheme does not require any secure channels (except for the initial key setup), which is different from what Tseng and Tsai claimed and so invalidates their contribution of the first RIBE with a public channel. Moreover, we point out that there are simple techniques to remove secure channels from the Boneh-Franklin RIBE. Interestingly, we show that the secure-channel-free Boneh-Franklin RIBE scheme is secure against decryption key exposure, whereas the Tseng-Tsai RIBE scheme is vulnerable to this attack.
引用
收藏
页码:2282 / 2285
页数:4
相关论文
共 50 条
  • [41] A New ID-based Multi-Recipient Public-key Encryption Scheme
    Pang Liaojun
    Gao Lu
    Pei Qingqi
    Gui Jingjing
    Wang Yumin
    CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (01): : 89 - 92
  • [42] An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem
    Meshram, Chandrashekhar
    INFORMATION PROCESSING LETTERS, 2015, 115 (02) : 351 - 358
  • [43] An ID-based broadcast encryption scheme for key distribution
    Du, XJ
    Wang, Y
    Ge, JH
    Wang, YM
    IEEE TRANSACTIONS ON BROADCASTING, 2005, 51 (02) : 264 - 266
  • [44] Efficient ID-based threshold signature
    Liu, Ying
    Hu, Yu-Pu
    Wang, Fei
    Lu, Xiao-Jun
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2006, 33 (02): : 311 - 315
  • [45] Efficient Anonymous Multi-receiver ID-based Encryption with Constant Decryption Cost
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    Huang, Sen-Shan
    Chien, Hung-Yu
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 130 - +
  • [46] Efficient ID-Based Proxy Pre-Encryption Scheme for Data Sharing in Cloud
    Zhang, Jian-Hong
    Zhen, Wei-Na
    Zhao, Xu-Bing
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 378 - 383
  • [47] An ID-based Broadcast Encryption Scheme for Collaborative Design
    Zhang, Ya-ling
    Zhang, Jing
    Zhang, Yi-kun
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 699 - 702
  • [48] An efficient ID-based delegation network
    Youn, Taek-Young
    Park, Young-Ho
    Kim, Chang Han
    Lim, Jongin
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 382 - 391
  • [49] An efficient ID-based Beta Cryptosystem
    Meshram, Chandrashekhar
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (02): : 189 - 202
  • [50] Construction of Subliminal Channel in ID-based Signatures
    Xin Xiangjun
    Li Qingbo
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 159 - 162