Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters. [PDF]
Revocation functionality and hierarchy key delegation are two necessary and crucial requirements to identity-based cryptosystems. Revocable hierarchical identity-based encryption (RHIBE) has attracted a lot of attention in recent years, many RHIBE ...
Qianqian Xing +3 more
doaj +5 more sources
Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data [PDF]
With the rapid development of cloud computing technology, cloud storage services are becoming more and more mature. However, the storage of sensitive data on remote servers poses privacy risks and is presently a source of concern.
Danial Shiraly +2 more
doaj +4 more sources
Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption [PDF]
Revocable Hierarchical Identity-Based Encryption (RHIBE) is a variant of Identity-Based Encryption (IBE), which enables the dynamic user management; a Key Generation Center (KGC) of a usual IBE has a key issuing ability. In contrast, in a RHIBE, a KGC can revoke compromised secret keys and even delegate both key issuing ability and revocation ability.
Jae Hong Seo, Keita Emura
semanticscholar +14 more sources
A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption [PDF]
Revocable hierarchical identity-based encryption (RHIBE) is an extension of HIBE that provides the efficient key revocation function by broadcasting an update key per each time period. Many RHIBE schemes have been proposed by combining an HIBE scheme and
Kwangsu Lee, Joon Sik Kim
doaj +3 more sources
Tightly Secure Hierarchical Identity-Based Encryption [PDF]
AbstractWe construct the first tightly secure hierarchical identity-based encryption (HIBE) scheme based on standard assumptions, which solves an open problem from Blazy, Kiltz, and Pan (CRYPTO 2014). At the core of our constructions is a novel randomization technique that enables us to randomize user secret keys for identities with flexible length.The
Langrehr, R., Pan, J.
semanticscholar +9 more sources
Efficient identity-based encryption with Hierarchical key-insulation from HIBE [PDF]
AbstractHierarchical key-insulated identity-based encryption (HKIBE) is identity-based encryption (IBE) that allows users to update their secret keys to achieve (hierarchical) key-exposure resilience, which is an important notion in practice. However, existing HKIBE constructions have limitations in efficiency: sizes of ciphertexts and secret keys ...
Keita Emura +2 more
semanticscholar +3 more sources
Timed-Release Hierarchical Identity-Based Encryption [PDF]
We propose a notion of hierarchical identity-based encryption (HIBE) scheme with timed-release encryption (TRE) mechanism, timed-release hierarchical identity-based encryption (TRHIBE), and define its security models. We also show a generic construction of TRHIBE from HIBE and one-time signature, and discuss the security of the constructed scheme.
Toru Oshikiri, Taiichi Saito
openaire +2 more sources
Revocable hierarchical identity-based broadcast encryption [PDF]
Hierarchical Identity-Based Broadcast Encryption (HIBBE) organizes users into a tree-like structure, and it allows users to delegate their decryption ability to subordinates and enable encryption to any subset of users while only intended users can decrypt. However, current HIBBE schemes do not support efficient revocation of private keys.
Dawei Li +4 more
openaire +2 more sources
Identity-Based Efficient Secure Data Communication Protocol for Hierarchical Sensor Groups in Smart Grid [PDF]
With the rapid evolution of smart grids, secure and efficient data communication among hierarchical sensor devices has become critical to ensure privacy and system integrity.
Yun Feng +4 more
doaj +2 more sources
Generalized Key Delegation for Hierarchical Identity-Based Encryption [PDF]
This paper introduces a new primitive called identity-based encryption with wildcard key derivation (WKD-IBE or 'wicked IBE') that enhances the concept of hierarchical identity-based encryption by allowing more general key delegation patterns. A secret key is derived for a vector of identity strings, where entries can be left blank using a wildcard ...
Abdalla, Michel +2 more
openaire +5 more sources

