4.5 Article

Identity-Based Encryption with Outsourced Revocation in Cloud Computing

期刊

IEEE TRANSACTIONS ON COMPUTERS
卷 64, 期 2, 页码 425-437

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TC.2013.208

关键词

Identity-based encryption (IBE); revocation; outsourcing; cloud computing

资金

  1. National Natural Science Foundation of China [61100224, 61272455, 61272423]
  2. Guangzhou Zhujiang Science and Technology Future Fellow Fund [2012J2200094]
  3. Distinguished Young Scholars Fund of Department of Education [Yq2013126]
  4. Guangdong Province
  5. China 111 Project [B08038]
  6. Doctoral Fund of Ministry of Education of China [20130203110004]
  7. Program for New Century Excellent Talents in University [NCET-13-0946]
  8. US National Science Foundation [CNS-1217889]
  9. Division Of Computer and Network Systems
  10. Direct For Computer & Info Scie & Enginr [1217889] Funding Source: National Science Foundation

向作者/读者索取更多资源

Identity-Based Encryption (IBE) which simplifies the public key and certificate management at Public Key Infrastructure (PKI) is an important alternative to public key encryption. However, one of the main efficiency drawbacks of IBE is the overhead computation at Private Key Generator (PKG) during user revocation. Efficient revocation has been well studied in traditional PKI setting, but the cumbersome management of certificates is precisely the burden that IBE strives to alleviate. In this paper, aiming at tackling the critical issue of identity revocation, we introduce outsourcing computation into IBE for the first time and propose a revocable IBE scheme in the server-aided setting. Our scheme offloads most of the key generation related operations during key-issuing and key-update processes to a Key Update Cloud Service Provider, leaving only a constant number of simple operations for PKG and users to perform locally. This goal is achieved by utilizing a novel collusion-resistant technique: we employ a hybrid private key for each user, in which an AND gate is involved to connect and bound the identity component and the time component. Furthermore, we propose another construction which is provable secure under the recently formulized Refereed Delegation of Computation model. Finally, we provide extensive experimental results to demonstrate the efficiency of our proposed construction.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据