Paper 2020/886

Adaptively Secure Revocable Hierarchical IBE from $k$-linear Assumption

Keita Emura, Atsushi Takayasu, and Yohei Watanabe

Abstract

Revocable identity-based encryption (RIBE) is an extension of IBE with an efficient key revocation mechanism. Revocable hierarchical IBE (RHIBE) is its further extension with key delegation functionality. Although there are various adaptively secure pairing-based RIBE schemes, all known hierarchical analogs only satisfy selective security. In addition, the currently known most efficient adaptively secure RIBE and selectively secure RHIBE schemes rely on non-standard assumptions, which are referred to as the augmented DDH assumption and $q$-type assumptions, respectively. In this paper, we propose a simple but effective design methodology for RHIBE schemes. We provide a generic design framework for RHIBE based on an HIBE scheme with a few properties. Fortunately, several state-of-the-art pairing-based HIBE schemes have the properties. In addition, our construction preserves the sizes of master public keys, ciphertexts, and decryption keys, as well as the complexity assumptions of the underlying HIBE scheme. Thus, we obtain the first RHIBE schemes with adaptive security under the standard $k$-linear assumption. We prove adaptive security by developing a new proof technique for RHIBE. Due to the compactness-preserving construction, the proposed R(H)IBE schemes have similar efficiencies to the most efficient existing schemes.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Minor revision. Designs, Codes and Cryptography
Contact author(s)
k-emura @ nict go jp
takayasu @ nict go jp
watanabe @ uec ac jp
History
2021-06-01: last of 2 revisions
2020-07-16: received
See all versions
Short URL
https://ia.cr/2020/886
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/886,
      author = {Keita Emura and Atsushi Takayasu and Yohei Watanabe},
      title = {Adaptively Secure Revocable Hierarchical IBE from $k$-linear Assumption},
      howpublished = {Cryptology ePrint Archive, Paper 2020/886},
      year = {2020},
      note = {\url{https://eprint.iacr.org/2020/886}},
      url = {https://eprint.iacr.org/2020/886}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.