Forward-secure hierarchical IBE with applications to broadcast encryption

Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

A forward-secure encryption scheme protects secret keys from exposure by evolving the keys with time. Forward security has several unique requirements in hierarchical identity-based encryption (HIBE) scheme: (1) users join dynamically; (2) encryption is joining-time-oblivious; (3) users evolve secret keys autonomously. We define and construct a scalable pairing-based forward-secure HIBE (fs-HIBE) scheme satisfying all of the above requirements. We also show how our fs-HIBE scheme can be used to realize a forward-secure public-key broadcast encryption scheme, which protects the secrecy of prior transmissions in the broadcast encryption setting. We further generalize fs-HIBE into a collusion-resistant multiple hierarchical ID-based encryption scheme, which can be used for secure communications with entities having multiple roles in role-based access control. The security of our schemes is based on the bilinear Diffie-Hellman assumption in the random oracle model.

Original languageEnglish (US)
Title of host publicationIdentity-Based Cryptography
PublisherIOS Press
Pages100-118
Number of pages19
ISBN (Print)9781586039479
DOIs
StatePublished - 2009

Publication series

NameCryptology and Information Security Series
Volume2
ISSN (Print)1871-6431
ISSN (Electronic)1879-8101

Keywords

  • Forward security
  • ID-based encryption
  • broadcast encryption

ASJC Scopus subject areas

  • Information Systems
  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Forward-secure hierarchical IBE with applications to broadcast encryption'. Together they form a unique fingerprint.

  • Cite this

    Yao, D., Fazio, N., Dodis, Y., & Lysyanskaya, A. (2009). Forward-secure hierarchical IBE with applications to broadcast encryption. In Identity-Based Cryptography (pp. 100-118). (Cryptology and Information Security Series; Vol. 2). IOS Press. https://doi.org/10.3233/978-1-58603-947-9-100