4.5 Article

Identity-Based Encryption with Outsourced Revocation in Cloud Computing

Journal

IEEE TRANSACTIONS ON COMPUTERS
Volume 64, Issue 2, Pages 425-437

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TC.2013.208

Keywords

Identity-based encryption (IBE); revocation; outsourcing; cloud computing

Funding

  1. National Natural Science Foundation of China [61100224, 61272455, 61272423]
  2. Guangzhou Zhujiang Science and Technology Future Fellow Fund [2012J2200094]
  3. Distinguished Young Scholars Fund of Department of Education [Yq2013126]
  4. Guangdong Province
  5. China 111 Project [B08038]
  6. Doctoral Fund of Ministry of Education of China [20130203110004]
  7. Program for New Century Excellent Talents in University [NCET-13-0946]
  8. US National Science Foundation [CNS-1217889]
  9. Division Of Computer and Network Systems
  10. Direct For Computer & Info Scie & Enginr [1217889] Funding Source: National Science Foundation

Ask authors/readers for more resources

Identity-Based Encryption (IBE) which simplifies the public key and certificate management at Public Key Infrastructure (PKI) is an important alternative to public key encryption. However, one of the main efficiency drawbacks of IBE is the overhead computation at Private Key Generator (PKG) during user revocation. Efficient revocation has been well studied in traditional PKI setting, but the cumbersome management of certificates is precisely the burden that IBE strives to alleviate. In this paper, aiming at tackling the critical issue of identity revocation, we introduce outsourcing computation into IBE for the first time and propose a revocable IBE scheme in the server-aided setting. Our scheme offloads most of the key generation related operations during key-issuing and key-update processes to a Key Update Cloud Service Provider, leaving only a constant number of simple operations for PKG and users to perform locally. This goal is achieved by utilizing a novel collusion-resistant technique: we employ a hybrid private key for each user, in which an AND gate is involved to connect and bound the identity component and the time component. Furthermore, we propose another construction which is provable secure under the recently formulized Refereed Delegation of Computation model. Finally, we provide extensive experimental results to demonstrate the efficiency of our proposed construction.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available