ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption

Danfeng Yao, Yevgeniy Dodis, Nelly Fazio, Anna Lysyanskaya

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

A forward-secure encryption scheme protects secret keys from exposure by evolving the keys with time. Forward security has several unique requirements in hierarchical identity-based encryption (HIBE) scheme: (1) users join dynamically; (2) encryption is joining-time-oblivious; (3) users evolve secret keys autonomously. We present a scalable forward-secure HIBE (fs-HIBE) scheme satisfying the above properties. We also show how our fs-HIBE scheme can be used to construct a forward-secure public-key broadcast encryption scheme, which protects the secrecy of prior transmissions in the broadcast encryption setting. We further generalize fs-HIBE into a collusion-resistant multiple hierarchical ID-based encryption scheme, which can be used for secure communications with entities having multiple roles in role-based access control. The security of our schemes is based on the bilinear Diffie-Hellman assumption in the random oracle model.

Original languageEnglish (US)
Title of host publicationProceedings of the ACM Conference on Computer and Communications Security
EditorsB. Pfitzmann, P. Liu
Pages354-363
Number of pages10
StatePublished - 2004
EventProceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004 - Washington, DC, United States
Duration: Oct 25 2004Oct 29 2004

Other

OtherProceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
Country/TerritoryUnited States
CityWashington, DC
Period10/25/0410/29/04

Keywords

  • Broadcast Encryption
  • Forward security
  • ID-Based Encryption

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption'. Together they form a unique fingerprint.

Cite this