期刊
IEEE TRANSACTIONS ON COMPUTERS
卷 64, 期 2, 页码 425-437出版社
IEEE COMPUTER SOC
DOI: 10.1109/TC.2013.208
关键词
Identity-based encryption (IBE); revocation; outsourcing; cloud computing
资金
- National Natural Science Foundation of China [61100224, 61272455, 61272423]
- Guangzhou Zhujiang Science and Technology Future Fellow Fund [2012J2200094]
- Distinguished Young Scholars Fund of Department of Education [Yq2013126]
- Guangdong Province
- China 111 Project [B08038]
- Doctoral Fund of Ministry of Education of China [20130203110004]
- Program for New Century Excellent Talents in University [NCET-13-0946]
- US National Science Foundation [CNS-1217889]
- Division Of Computer and Network Systems
- Direct For Computer & Info Scie & Enginr [1217889] Funding Source: National Science Foundation
Identity-Based Encryption (IBE) which simplifies the public key and certificate management at Public Key Infrastructure (PKI) is an important alternative to public key encryption. However, one of the main efficiency drawbacks of IBE is the overhead computation at Private Key Generator (PKG) during user revocation. Efficient revocation has been well studied in traditional PKI setting, but the cumbersome management of certificates is precisely the burden that IBE strives to alleviate. In this paper, aiming at tackling the critical issue of identity revocation, we introduce outsourcing computation into IBE for the first time and propose a revocable IBE scheme in the server-aided setting. Our scheme offloads most of the key generation related operations during key-issuing and key-update processes to a Key Update Cloud Service Provider, leaving only a constant number of simple operations for PKG and users to perform locally. This goal is achieved by utilizing a novel collusion-resistant technique: we employ a hybrid private key for each user, in which an AND gate is involved to connect and bound the identity component and the time component. Furthermore, we propose another construction which is provable secure under the recently formulized Refereed Delegation of Computation model. Finally, we provide extensive experimental results to demonstrate the efficiency of our proposed construction.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据