Javascript must be enabled to continue!
Anonymous Revocable Identity-Based Encryption Supporting Anonymous Revocation
View through CrossRef
Anonymous identity-based encryption (AIBE) is an extension of identity-based encryption (IBE) that enhances the privacy of a ciphertext by providing ciphertext anonymity. In this paper, we introduce the concept of revocable IBE with anonymous revocation (RIBE-AR), which can issue an update key and hide the revoked set of the update key that efficiently revokes private keys of AIBE. We first define the security models of RIBE-AR and propose an efficient RIBE-AR scheme in bilinear groups. Our RIBE-AR scheme is similar to the existing RIBE scheme in terms of efficiency, but it is the first RIBE scheme to provide additional ciphertext anonymity and revocation privacy. We show that our RIBE-AR scheme provides selective message privacy, selective identity privacy, and selective revocation privacy.
Title: Anonymous Revocable Identity-Based Encryption Supporting Anonymous Revocation
Description:
Anonymous identity-based encryption (AIBE) is an extension of identity-based encryption (IBE) that enhances the privacy of a ciphertext by providing ciphertext anonymity.
In this paper, we introduce the concept of revocable IBE with anonymous revocation (RIBE-AR), which can issue an update key and hide the revoked set of the update key that efficiently revokes private keys of AIBE.
We first define the security models of RIBE-AR and propose an efficient RIBE-AR scheme in bilinear groups.
Our RIBE-AR scheme is similar to the existing RIBE scheme in terms of efficiency, but it is the first RIBE scheme to provide additional ciphertext anonymity and revocation privacy.
We show that our RIBE-AR scheme provides selective message privacy, selective identity privacy, and selective revocation privacy.
Related Results
An efficient scheme to support direct revocation in cloud computing using CPABE: The approach with less time constraints
An efficient scheme to support direct revocation in cloud computing using CPABE: The approach with less time constraints
Secure Data sharing is a major issue of concern in cloud computing. CPABE is well known encryption technique for dealing with the problem of data security over network. Most of the...
Définition et conception d'un système optimal de la révocation de certificats
Définition et conception d'un système optimal de la révocation de certificats
La Public Key Infrastructure(PKI) est une infrastructure à clés publique dont l’objectif est de répondre à des besoins tel que : l’authentification de clés publiques, le contrôle d...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Revocable-Attribute-Based Encryption with En-DKER from Lattices
Revocable-Attribute-Based Encryption with En-DKER from Lattices
Cloud computing offers abundant computing resources and scalable storage, but data leakage in the cloud storage environment is a common and critical concern due to inadequate prote...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography
mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography
Abstract
We address the problem of user fast revocation in the lattice-based Ciphertext Policy Attribute-Based Encryption (CP-ABE) by extending the scheme originally...

