DOI QR코드

DOI QR Code

Hierarchical Identity-Based Encryption with Constant-Size Private Keys

  • Zhang, Leyou (Department of Mathematics, Xidian University) ;
  • Wu, Qing (School of Automation, Xi'an University of Posts and Telecommunications) ;
  • Hu, Yupu (Key Lab of CNIS, Xidian University)
  • Received : 2011.04.07
  • Accepted : 2011.07.01
  • Published : 2012.02.01

Abstract

The main challenge at present in constructing hierarchical identity-based encryption (HIBE) is to solve the trade-off between private-key size and ciphertext size. At least one private-key size or ciphertext size in the existing schemes must rely on the hierarchy depth. In this letter, a new hierarchical computing technique is introduced to HIBE. Unlike others, the proposed scheme, which consists of only two group elements, achieves constant-size private keys. In addition, the ciphertext consists of just three group elements, regardless of the hierarchy depth. To the best of our knowledge, it is the first efficient scheme where both ciphertexts and private keys achieve O(1)-size, which is the best trade-off between private-key size and ciphertext size at present. We also give the security proof in the selective-identity model.

Keywords

References

  1. A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," Proc. CRYPTO, LNCS, vol. 196, 1985, pp. 47-53.
  2. D. Boneh and M. Franklin. "Identity Based Encryption from the Weil Pairing," Proc. CRYPTO, LNCS, vol. 2139, 2001, pp. 213-229.
  3. J. Sun and Y. Fang, "Cross-Domain Delegation for Sensitive Data Sharing in Distributed Electronic Health Record Systems," IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 6, 2010, pp. 754-764.
  4. L. Yan, C.M. Rong, and G.S. Zhao, "Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography," CloudCom, LNCS, vol. 5931, 2009, pp. 167-177.
  5. N.P. Smart and B. Warinschi, "Identity Based Group Signatures from Hierarchical Identity-Based Encryption," Pairing, LNCS, vol. 5671, 2009, pp. 150-170.
  6. C. Gentry and A. Silverberg, "Hierarchical ID-Based Cryptography," Proc. ASIACRYPT, LNCS, vol. 2501, 2002, pp. 548 -566.
  7. D. Boneh and X. Boyen, "Efficient Selective-ID Secure Identity- Based Encryption without Random Oracles," Proc. EUROCRYPT, LNCS, vol. 3027, 2004, pp. 223-238.
  8. D. Boneh, X. Boyen, and E. Goh, "Hierarchical Identity Based Encryption with Constant Ciphertext," Proc. EUROCRYPT, LNCS, vol. 3494, 2005, pp. 440-456.
  9. J.H. Seo and J.H. Cheon, "Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts." http://eprint.iacr.org/2011/021
  10. J.H. Seo et al., "Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts," IEICE Trans. Fundamentals, vol. E94.A, no. 1, 2011, pp. 45-56.
  11. X.M. Hu, S.T. Huang, and X. Fan, "Practical Hierarchical Identity Based Encryption Scheme without Random Oracles," IEICE Trans. Fundamentals Electron. Commun. Comput. Sci., E92.A, no. 6, June 2009, pp. 1494-1499.
  12. B. Waters, "Efficient Identity-Based Encryption without Random Oracles," Proc. EUROCRYPT, LNCS, vol. 3494, 2005, pp. 114- 127.
  13. B. Waters, "Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions," Proc. CRYPTO, LNCS, vol. 5677, 2009, pp. 619-636.
  14. A. Lewko and B. Waters, "New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts," Proc. TCC, LNCS, vol. 5978, 2010, pp. 455-479.
  15. Y.L. Ren and D.W. Gu. "Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model," Informatica, vol. 32, no. 2, 2008, pp. 207-211
  16. X. Wang and X. Yang, "Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model," Cryptology ePrint Archive, Report 2010/113, 2010.
  17. D. Cash, D. Hofheinz, and E. Kiltz, "How to Delegate a Lattice Basis," Cryptology ePrint Archive, Report 2009/351 (2009). http://eprint.iacr.org/
  18. S. Agrawal, D. Boneh, and X. Boyen, "Efficient Lattice (H)IBE in the Standard Model," Proc. EUROCRYPT, LNCS, vol. 6110, 2010, pp. 553-572

Cited by

  1. New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing vol.7, pp.5, 2012, https://doi.org/10.3837/tiis.2013.05.023
  2. ID-Based Optimistic Fair Exchange Scheme Based on RSA vol.36, pp.4, 2012, https://doi.org/10.4218/etrij.14.0113.0351
  3. Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys vol.59, pp.4, 2012, https://doi.org/10.1093/comjnl/bxv059