File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1016/j.ins.2018.09.020
- Scopus: eid_2-s2.0-85053339873
- WOS: WOS:000448229300003
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters
Title | Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters |
---|---|
Authors | |
Keywords | Increasing maximal revocation number Enhanced security model Identity-Based revocation system Short-parameter construction |
Issue Date | 2019 |
Citation | Information Sciences, 2019, v. 472, p. 35-52 How to Cite? |
Abstract | © 2018 Elsevier Inc. Identity-based revocation system (IBRS) produces a ciphertext based on the revoked identities such that this ciphertext can only be decrypted by the private keys of non-revoked identities. IBRS can be classified into unbounded IBRS and bounded IBRS, depending on whether to set a maximal revocation number (e.g., N) or not. Compared to unbounded IBRS, existing bounded IBRS schemes have the advantage of short ciphertexts, however, they cannot support an increase of N and have to fix a large N to provide the revocation. This compromises the computational efficiency, which is linear in N. To bridge this gap, we are interested in exploring whether N can be dynamic. Precisely, N is initially set as a small number and increased into a larger one when more than N identities are revoked, while this increase does not affect other non-revoked users in the system. In this paper, motivated by the security of bounded IBRS with a dynamic N, we define an enhanced security model, which allows the corruption of any polynomial number (e.g., n) of private keys, independent of N. It augments existing security models by running different challenges when n ≤ N and n > N, respectively. The enhanced security model suits both unbounded IBRS and bounded IBRS with a general description that can be “empty” for unbounded IBRS or a special N for bounded IBRS. Then, we propose a scalable bounded IBRS scheme and are able to prove its security in an enhanced security model. The increase of N incurs no changing on all of the existing private keys and the only cost is a slight expansion of the master public keys. Our proposed scheme also has short ciphertexts and private keys, comparable to the state-of-the-art (bounded) IBRS schemes. |
Persistent Identifier | http://hdl.handle.net/10722/280682 |
ISSN | 2022 Impact Factor: 8.1 2023 SCImago Journal Rankings: 2.238 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jiang, Peng | - |
dc.contributor.author | Lai, Jianchang | - |
dc.contributor.author | Guo, Fuchun | - |
dc.contributor.author | Susilo, Willy | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Yang, Guomin | - |
dc.contributor.author | Mu, Yi | - |
dc.contributor.author | Chen, Rongmao | - |
dc.date.accessioned | 2020-02-17T14:34:40Z | - |
dc.date.available | 2020-02-17T14:34:40Z | - |
dc.date.issued | 2019 | - |
dc.identifier.citation | Information Sciences, 2019, v. 472, p. 35-52 | - |
dc.identifier.issn | 0020-0255 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280682 | - |
dc.description.abstract | © 2018 Elsevier Inc. Identity-based revocation system (IBRS) produces a ciphertext based on the revoked identities such that this ciphertext can only be decrypted by the private keys of non-revoked identities. IBRS can be classified into unbounded IBRS and bounded IBRS, depending on whether to set a maximal revocation number (e.g., N) or not. Compared to unbounded IBRS, existing bounded IBRS schemes have the advantage of short ciphertexts, however, they cannot support an increase of N and have to fix a large N to provide the revocation. This compromises the computational efficiency, which is linear in N. To bridge this gap, we are interested in exploring whether N can be dynamic. Precisely, N is initially set as a small number and increased into a larger one when more than N identities are revoked, while this increase does not affect other non-revoked users in the system. In this paper, motivated by the security of bounded IBRS with a dynamic N, we define an enhanced security model, which allows the corruption of any polynomial number (e.g., n) of private keys, independent of N. It augments existing security models by running different challenges when n ≤ N and n > N, respectively. The enhanced security model suits both unbounded IBRS and bounded IBRS with a general description that can be “empty” for unbounded IBRS or a special N for bounded IBRS. Then, we propose a scalable bounded IBRS scheme and are able to prove its security in an enhanced security model. The increase of N incurs no changing on all of the existing private keys and the only cost is a slight expansion of the master public keys. Our proposed scheme also has short ciphertexts and private keys, comparable to the state-of-the-art (bounded) IBRS schemes. | - |
dc.language | eng | - |
dc.relation.ispartof | Information Sciences | - |
dc.subject | Increasing maximal revocation number | - |
dc.subject | Enhanced security model | - |
dc.subject | Identity-Based revocation system | - |
dc.subject | Short-parameter construction | - |
dc.title | Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1016/j.ins.2018.09.020 | - |
dc.identifier.scopus | eid_2-s2.0-85053339873 | - |
dc.identifier.volume | 472 | - |
dc.identifier.spage | 35 | - |
dc.identifier.epage | 52 | - |
dc.identifier.isi | WOS:000448229300003 | - |
dc.identifier.issnl | 0020-0255 | - |