Skip to main content

2018 | OriginalPaper | Buchkapitel

Revocable Certificateless Encryption with Ciphertext Evolution

verfasst von : Yinxia Sun, Futai Zhang, Anmin Fu

Erschienen in: Information Security and Privacy

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The user revocation of certificateless cryptosystems is an important issue. One of the existing solutions is to issue extra time keys periodically for every non-revoked user. However, since the scheme requires different time keys to decrypt data for different time periods, the user needs to hold a long list of time keys (linear growth with time), which is inefficient in practical applications. Moreover, the ciphertexts produced before revocation are still available to the revoked users, which is not acceptable in most applications such as cloud storage. To overcome these shortcomings, in this paper, we present an efficient solution called revocable certificateless encryption with ciphertext evolution. In our scheme, a current time key together with a private key are enough for the decryptions by non-revoked users. Meanwhile, revoked users cannot make decryptions on ciphertexts in the past any more. We give formal security proofs based on the IND-CPA model under the standard BDH problem.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Al-Riyami, S.S.: Cryptographic schemes based on elliptic curve pairings. Ph.D. thesis, Royal Holloway, University of London (2004) Al-Riyami, S.S.: Cryptographic schemes based on elliptic curve pairings. Ph.D. thesis, Royal Holloway, University of London (2004)
4.
Zurück zum Zitat Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation. In: CCS 2008, pp. 417–426. ACM (2008) Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation. In: CCS 2008, pp. 417–426. ACM (2008)
8.
Zurück zum Zitat He, D., Kumar, N., Wang, H., et al.: Privacy-preserving certificateless provable data possession scheme for big data storage on cloud. Appl. Math. Comput. 314, 31–43 (2017)MathSciNetMATH He, D., Kumar, N., Wang, H., et al.: Privacy-preserving certificateless provable data possession scheme for big data storage on cloud. Appl. Math. Comput. 314, 31–43 (2017)MathSciNetMATH
9.
Zurück zum Zitat Ju, H.S., Kim, D.Y., Lee, D.H., Lim, J., Chun, K.: Efficient revocation of security capability in certificateless public key cryptography. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3682, pp. 453–459. Springer, Heidelberg (2005). https://doi.org/10.1007/11552451_60CrossRef Ju, H.S., Kim, D.Y., Lee, D.H., Lim, J., Chun, K.: Efficient revocation of security capability in certificateless public key cryptography. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3682, pp. 453–459. Springer, Heidelberg (2005). https://​doi.​org/​10.​1007/​11552451_​60CrossRef
10.
Zurück zum Zitat Libert, B., Quisquater, J.J.: Efficient revocation and threshold pairing based cryptosystems. In: Symposium on Principles of Distributed Computing-PODC 2003, pp. 163–171 (2003) Libert, B., Quisquater, J.J.: Efficient revocation and threshold pairing based cryptosystems. In: Symposium on Principles of Distributed Computing-PODC 2003, pp. 163–171 (2003)
15.
Zurück zum Zitat Seo, S.H., Nabeel, M., Ding, X., Bertino, E.: An efficient certificateless encryption for secure data sharing in public clouds. IEEE Trans. Knowl. Data Eng. 26(9), 2107–2119 (2014)CrossRef Seo, S.H., Nabeel, M., Ding, X., Bertino, E.: An efficient certificateless encryption for secure data sharing in public clouds. IEEE Trans. Knowl. Data Eng. 26(9), 2107–2119 (2014)CrossRef
17.
Zurück zum Zitat Sun, Y., Zhang, F., Shen, L., Deng, R.H.: Efficient revocable certificateless encryption against decryption key exposure. IET Inf. Secur. 9(3), 158–166 (2015)CrossRef Sun, Y., Zhang, F., Shen, L., Deng, R.H.: Efficient revocable certificateless encryption against decryption key exposure. IET Inf. Secur. 9(3), 158–166 (2015)CrossRef
18.
Zurück zum Zitat Sun, Y., Zhang, Z., Shen, L.: A revocable certificateless encryption scheme with high performance. Int. J. High Perform. Comput. Netw. 11(1), 83–91 (2018)CrossRef Sun, Y., Zhang, Z., Shen, L.: A revocable certificateless encryption scheme with high performance. Int. J. High Perform. Comput. Netw. 11(1), 83–91 (2018)CrossRef
19.
Zurück zum Zitat Tsai, T.T., Tseng, Y.M.: Revocable Certificateless Public Key Encryption. IEEE Syst. J. 9(3), 824–833 (2015)CrossRef Tsai, T.T., Tseng, Y.M.: Revocable Certificateless Public Key Encryption. IEEE Syst. J. 9(3), 824–833 (2015)CrossRef
Metadaten
Titel
Revocable Certificateless Encryption with Ciphertext Evolution
verfasst von
Yinxia Sun
Futai Zhang
Anmin Fu
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-93638-3_42

Premium Partner