Journal
IEEE TRANSACTIONS ON COMPUTERS
Volume 64, Issue 2, Pages 425-437Publisher
IEEE COMPUTER SOC
DOI: 10.1109/TC.2013.208
Keywords
Identity-based encryption (IBE); revocation; outsourcing; cloud computing
Funding
- National Natural Science Foundation of China [61100224, 61272455, 61272423]
- Guangzhou Zhujiang Science and Technology Future Fellow Fund [2012J2200094]
- Distinguished Young Scholars Fund of Department of Education [Yq2013126]
- Guangdong Province
- China 111 Project [B08038]
- Doctoral Fund of Ministry of Education of China [20130203110004]
- Program for New Century Excellent Talents in University [NCET-13-0946]
- US National Science Foundation [CNS-1217889]
- Division Of Computer and Network Systems
- Direct For Computer & Info Scie & Enginr [1217889] Funding Source: National Science Foundation
Ask authors/readers for more resources
Identity-Based Encryption (IBE) which simplifies the public key and certificate management at Public Key Infrastructure (PKI) is an important alternative to public key encryption. However, one of the main efficiency drawbacks of IBE is the overhead computation at Private Key Generator (PKG) during user revocation. Efficient revocation has been well studied in traditional PKI setting, but the cumbersome management of certificates is precisely the burden that IBE strives to alleviate. In this paper, aiming at tackling the critical issue of identity revocation, we introduce outsourcing computation into IBE for the first time and propose a revocable IBE scheme in the server-aided setting. Our scheme offloads most of the key generation related operations during key-issuing and key-update processes to a Key Update Cloud Service Provider, leaving only a constant number of simple operations for PKG and users to perform locally. This goal is achieved by utilizing a novel collusion-resistant technique: we employ a hybrid private key for each user, in which an AND gate is involved to connect and bound the identity component and the time component. Furthermore, we propose another construction which is provable secure under the recently formulized Refereed Delegation of Computation model. Finally, we provide extensive experimental results to demonstrate the efficiency of our proposed construction.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available