首页> 外文期刊>Information Forensics and Security, IEEE Transactions on >Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption
【24h】

Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption

机译:基于通配身份和内部产品加密的通用密钥委托

获取原文
获取原文并翻译 | 示例

摘要

Inspired by the fact that many e-mail addresses correspond to groups of users, Abdalla introduced the notion of identity-based encryption with wildcards (WIBE), which allows a sender to simultaneously encrypt messages to a group of users matching a certain pattern, defined as a sequence of identity strings and wildcards. This notion was later generalized by Abdalla, Kiltz, and Neven, who considered more general delegation patterns during the key derivation process. Despite its many applications, current constructions have two significant limitations: 1) they are only known to be fully secure when the maximum hierarchy depth is a constant; and 2) they do not hide the pattern associated with the ciphertext. To overcome these, this paper offers two new constructions. First, we show how to convert a WIBE scheme of Abdalla into a (nonanonymous) WIBE scheme with generalized key delegation (WW-IBE) that is fully secure even for polynomially many levels. Then, to achieve anonymity, we initially consider hierarchical predicate encryption (HPE) schemes with more generalized forms of key delegation and use them to construct an anonymous WW-IBE scheme. Finally, to instantiate the former, we modify the HPE scheme of Lewko to allow for more general key delegation patterns. Our proofs are in the standard model and use existing complexity assumptions.
机译:受许多电子邮件地址对应于用户组这一事实的启发,Abdalla引入了带有通配符的基于身份的加密的概念(WIBE),该概念允许发件人同时对匹配特定模式,已定义的一组用户的邮件进行加密。作为身份字符串和通配符的序列。此概念后来由Abdalla,Kiltz和Neven推广,他们在密钥派生过程中考虑了更一般的委派模式。尽管有很多应用,但是当前的构造有两个明显的局限性:1)仅当最大层次深度为常数时,才知道它们是完全安全的。 2)它们不隐藏与密文相关的模式。为了克服这些问题,本文提供了两种新的结构。首先,我们展示如何将Abdalla的WIBE方案转换为具有广义密钥委托(WW-IBE)的(非匿名)WIBE方案,该方案即使对于多项式多个级别也是完全安全的。然后,为了实现匿名性,我们首先考虑具有更广泛形式的密钥委托形式的层次谓词加密(HPE)方案,并使用它们来构造匿名WW-IBE方案。最后,为实例化前者,我们修改了Lewko的HPE方案,以允许使用更通用的密钥委托模式。我们的证明位于标准模型中,并使用现有的复杂性假设。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号