Browse > Article
http://dx.doi.org/10.4218/etrij.12.0211.0140

Hierarchical Identity-Based Encryption with Constant-Size Private Keys  

Zhang, Leyou (Department of Mathematics, Xidian University)
Wu, Qing (School of Automation, Xi'an University of Posts and Telecommunications)
Hu, Yupu (Key Lab of CNIS, Xidian University)
Publication Information
ETRI Journal / v.34, no.1, 2012 , pp. 142-145 More about this Journal
Abstract
The main challenge at present in constructing hierarchical identity-based encryption (HIBE) is to solve the trade-off between private-key size and ciphertext size. At least one private-key size or ciphertext size in the existing schemes must rely on the hierarchy depth. In this letter, a new hierarchical computing technique is introduced to HIBE. Unlike others, the proposed scheme, which consists of only two group elements, achieves constant-size private keys. In addition, the ciphertext consists of just three group elements, regardless of the hierarchy depth. To the best of our knowledge, it is the first efficient scheme where both ciphertexts and private keys achieve O(1)-size, which is the best trade-off between private-key size and ciphertext size at present. We also give the security proof in the selective-identity model.
Keywords
HIBE; large-scale network; identity-based encryption; standard model; selective-identity security;
Citations & Related Records

Times Cited By Web Of Science : 1  (Related Records In Web of Science)
연도 인용수 순위
  • Reference
1 X.M. Hu, S.T. Huang, and X. Fan, "Practical Hierarchical Identity Based Encryption Scheme without Random Oracles," IEICE Trans. Fundamentals Electron. Commun. Comput. Sci., E92.A, no. 6, June 2009, pp. 1494-1499.
2 B. Waters, "Efficient Identity-Based Encryption without Random Oracles," Proc. EUROCRYPT, LNCS, vol. 3494, 2005, pp. 114- 127.
3 B. Waters, "Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions," Proc. CRYPTO, LNCS, vol. 5677, 2009, pp. 619-636.
4 A. Lewko and B. Waters, "New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts," Proc. TCC, LNCS, vol. 5978, 2010, pp. 455-479.
5 Y.L. Ren and D.W. Gu. "Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model," Informatica, vol. 32, no. 2, 2008, pp. 207-211
6 X. Wang and X. Yang, "Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model," Cryptology ePrint Archive, Report 2010/113, 2010.
7 D. Cash, D. Hofheinz, and E. Kiltz, "How to Delegate a Lattice Basis," Cryptology ePrint Archive, Report 2009/351 (2009). http://eprint.iacr.org/
8 S. Agrawal, D. Boneh, and X. Boyen, "Efficient Lattice (H)IBE in the Standard Model," Proc. EUROCRYPT, LNCS, vol. 6110, 2010, pp. 553-572
9 A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," Proc. CRYPTO, LNCS, vol. 196, 1985, pp. 47-53.
10 D. Boneh and M. Franklin. "Identity Based Encryption from the Weil Pairing," Proc. CRYPTO, LNCS, vol. 2139, 2001, pp. 213-229.
11 J. Sun and Y. Fang, "Cross-Domain Delegation for Sensitive Data Sharing in Distributed Electronic Health Record Systems," IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 6, 2010, pp. 754-764.
12 L. Yan, C.M. Rong, and G.S. Zhao, "Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography," CloudCom, LNCS, vol. 5931, 2009, pp. 167-177.
13 N.P. Smart and B. Warinschi, "Identity Based Group Signatures from Hierarchical Identity-Based Encryption," Pairing, LNCS, vol. 5671, 2009, pp. 150-170.
14 C. Gentry and A. Silverberg, "Hierarchical ID-Based Cryptography," Proc. ASIACRYPT, LNCS, vol. 2501, 2002, pp. 548 -566.
15 D. Boneh and X. Boyen, "Efficient Selective-ID Secure Identity- Based Encryption without Random Oracles," Proc. EUROCRYPT, LNCS, vol. 3027, 2004, pp. 223-238.
16 D. Boneh, X. Boyen, and E. Goh, "Hierarchical Identity Based Encryption with Constant Ciphertext," Proc. EUROCRYPT, LNCS, vol. 3494, 2005, pp. 440-456.
17 J.H. Seo and J.H. Cheon, "Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts." http://eprint.iacr.org/2011/021
18 J.H. Seo et al., "Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts," IEICE Trans. Fundamentals, vol. E94.A, no. 1, 2011, pp. 45-56.