Paper 2004/338

Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application

Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, and Hideki Imai

Abstract

In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary string. In practice, key revocation is a necessary and inevitable process and IBE is no exception when it comes to having to manage revocation of decryption keys without losing its merits in efficiency. Our main contribution of this paper is to propose novel constructions of IBE where the decryption key can be renewed without having to make changes to its public key, i.e. user's identity. We achieve this by tactfully extending the hierarchical IBE (HIBE). Regarding security, we address semantic security against adaptive chosen cipher-text attack for a very strong attack environment that models all possible types of key exposures in the random oracle model. Straightforward extension of the HIBE, however, does not achieve our goal and such scheme is completely insecure under our attack model. In addition to this, we show method of constructing (partially collusion resistant) HIBE from arbitrary IBE in the random oracle model. By combining these results, we can construct an IBE with non-interactive key update from only an arbitrary IBE.

Note: This paper supersedes a previous version which is entitled as "Identity-Based Encryption with Non-Interactive Key Update".

Metadata
Available format(s)
PDF PS
Category
Public-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Contact author(s)
hanaoka-goichiro @ aist go jp
History
2005-12-12: last of 2 revisions
2004-12-02: received
See all versions
Short URL
https://ia.cr/2004/338
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2004/338,
      author = {Yumiko Hanaoka and Goichiro Hanaoka and Junji Shikata and Hideki Imai},
      title = {Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application},
      howpublished = {Cryptology ePrint Archive, Paper 2004/338},
      year = {2004},
      note = {\url{https://eprint.iacr.org/2004/338}},
      url = {https://eprint.iacr.org/2004/338}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.