As Hierarchical Identity Based Encryption (HIBE) system usually maps the true institutional structure of an organization or entity relationship between objects in real world, It is important that computation & communication complexity of private key, ciphertext, cryptographic computations and so on related to an entity in the hierarchy is independent to the hierarchy depth of the entity. Moreover, key escrow problem that any non-leaf entity in a hierarchical identity based cryptosystem can derive private keys for its descendants with use of its private key should be resolved, in order to prevent any entity from behaving on behalf of its descendants. In this paper, a new technique is introduced for composing a private key for each individual entity in HIBE system by differentiating between non-local identifiers and local identifiers of the identity of the entity. That we call Identifier Discrimination. With the technique, A selective identity secure HIBE system is constructed under Decisional Bilinear Diffie-Hellman (DBDH) assumption without using random oracles, where the private key and the ciphertext consist of constant number of group elements, and decryption requires only three bilinear map computations, regardless of the identity hierarchy depth. Moreover, in contrast to previous HIBE constructions, where private key for an entity can be derived by its ancestors with direct use of their private keys, key escrow problem inherent in identity based cryptosystems is resolved in our HIBE construction. Privilege of deriving private keys for an entity can be delegated to any of its ancestors through authorization by distributing specifically crafted values to the ancestor in our HIBE system, that we call Authorized Delegation.
목차
Abstract 1. Introduction 1.1. Problem Formulation 1.2. Related Work 1.3. Our Approach 2. Preliminaries 2.1. Bilinear Pairings 2.2. HIBE Systems 2.3. Complexity Assumptions 3. Our HIBE Construction with Constant Size Private Key and Constant Size Ciphertext 3.1. Construction 3.2. Correctness and Dedicated Encryption Privacy 4. Authorized Delegation: Private Key Derivation with Authorized Secret 4.1. Private Key – Ineligible Secret for Derivation 4.2. Authorized Secret for Derivation 5. Conclusion References
Jian-Wu Zheng [ Institute of Electrical Engineering, Yanshan University, 066004, China, School of Transportation, Shijiazhuang Tiedao University, 050043, China ]
Jing Zhao [ School of Civil Engineering, Shijiazhuang Tiedao University, 050043, China ]
Xin-Ping Guan [ Institute of Electrical Engineering, Yanshan University, 066004, China, Department of Automation, Shanghai Jiao Tong University, 200240, China ]
보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
설립연도
2006
분야
공학>컴퓨터학
소개
1. 보안공학에 대한 각종 조사 및 연구
2. 보안공학에 대한 응용기술 연구 및 발표
3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최
4. 보안공학 기술의 상호 협조 및 정보교환
5. 보안공학에 관한 표준화 사업 및 규격의 제정
6. 보안공학에 관한 산학연 협동의 증진
7. 국제적 학술 교류 및 기술 협력
8. 보안공학에 관한 논문지 발간
9. 기타 본 회 목적 달성에 필요한 사업
간행물
간행물명
International Journal of Security and Its Applications
간기
격월간
pISSN
1738-9976
수록기간
2008~2016
등재여부
SCOPUS
십진분류
KDC 505DDC 605
이 권호 내 다른 논문 / International Journal of Security and Its Applications Vol.10 No.8