Our method is based on the researches in key-leakage resilience. It thus gives an interesting and rather surprised connection between the rich domain of key-leakage resilient cryptography and Pirates 2.0. We first formalize the notion of key-leakage resilient revoke system and then identify sufficient conditions so that a key-leakage resilient revoke scheme can resist Pirates 2.0 in any form. We finally propose a construction of a secure key-leakage resilient identity-based revoke system that fulfills the required conditions. The main ingredient in the construction relies on the identity-based encryption with wildcards ($\WIBE$) and our construction of key-leakage resilient $\WIBE$ could be useful in its own right.
Category / Keywords: Pirates 2.0, Leakage-resilience, wildcards, revocation. Date: received 31 May 2012, last revised 2 Jun 2012 Contact author: cuongtrinhviet at gmail com Available format(s): PDF | BibTeX Citation Note: Fix some grammatical errors Version: 20120603:213447 (All versions of this report) Short URL: ia.cr/2012/305 Discussion forum: Show discussion | Start new discussion