ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption

Danfeng Yao, Yevgeniy Dodis, Nelly Fazio, Anna Lysyanskaya

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

A forward-secure encryption scheme protects secret keys from exposure by evolving the keys with time. Forward security has several unique requirements in hierarchical identity-based encryption (HIBE) scheme: (1) users join dynamically; (2) encryption is joining-time-oblivious; (3) users evolve secret keys autonomously. We present a scalable forward-secure HIBE (fs-HIBE) scheme satisfying the above properties. We also show how our fs-HIBE scheme can be used to construct a forward-secure public-key broadcast encryption scheme, which protects the secrecy of prior transmissions in the broadcast encryption setting. We further generalize fs-HIBE into a collusion-resistant multiple hierarchical ID-based encryption scheme, which can be used for secure communications with entities having multiple roles in role-based access control. The security of our schemes is based on the bilinear Diffie-Hellman assumption in the random oracle model.

Original languageEnglish (US)
Title of host publicationProceedings of the ACM Conference on Computer and Communications Security
EditorsB. Pfitzmann, P. Liu
Pages354-363
Number of pages10
StatePublished - 2004
EventProceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004 - Washington, DC, United States
Duration: Oct 25 2004Oct 29 2004

Other

OtherProceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
CountryUnited States
CityWashington, DC
Period10/25/0410/29/04

Fingerprint

Cryptography
Access control
Joining

Keywords

  • Broadcast Encryption
  • Forward security
  • ID-Based Encryption

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Yao, D., Dodis, Y., Fazio, N., & Lysyanskaya, A. (2004). ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. In B. Pfitzmann, & P. Liu (Eds.), Proceedings of the ACM Conference on Computer and Communications Security (pp. 354-363)

ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. / Yao, Danfeng; Dodis, Yevgeniy; Fazio, Nelly; Lysyanskaya, Anna.

Proceedings of the ACM Conference on Computer and Communications Security. ed. / B. Pfitzmann; P. Liu. 2004. p. 354-363.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Yao, D, Dodis, Y, Fazio, N & Lysyanskaya, A 2004, ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. in B Pfitzmann & P Liu (eds), Proceedings of the ACM Conference on Computer and Communications Security. pp. 354-363, Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, United States, 10/25/04.
Yao D, Dodis Y, Fazio N, Lysyanskaya A. ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. In Pfitzmann B, Liu P, editors, Proceedings of the ACM Conference on Computer and Communications Security. 2004. p. 354-363
Yao, Danfeng ; Dodis, Yevgeniy ; Fazio, Nelly ; Lysyanskaya, Anna. / ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. Proceedings of the ACM Conference on Computer and Communications Security. editor / B. Pfitzmann ; P. Liu. 2004. pp. 354-363
@inproceedings{72fe927b5efb4b548ce49606a8a36269,
title = "ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption",
abstract = "A forward-secure encryption scheme protects secret keys from exposure by evolving the keys with time. Forward security has several unique requirements in hierarchical identity-based encryption (HIBE) scheme: (1) users join dynamically; (2) encryption is joining-time-oblivious; (3) users evolve secret keys autonomously. We present a scalable forward-secure HIBE (fs-HIBE) scheme satisfying the above properties. We also show how our fs-HIBE scheme can be used to construct a forward-secure public-key broadcast encryption scheme, which protects the secrecy of prior transmissions in the broadcast encryption setting. We further generalize fs-HIBE into a collusion-resistant multiple hierarchical ID-based encryption scheme, which can be used for secure communications with entities having multiple roles in role-based access control. The security of our schemes is based on the bilinear Diffie-Hellman assumption in the random oracle model.",
keywords = "Broadcast Encryption, Forward security, ID-Based Encryption",
author = "Danfeng Yao and Yevgeniy Dodis and Nelly Fazio and Anna Lysyanskaya",
year = "2004",
language = "English (US)",
pages = "354--363",
editor = "B. Pfitzmann and P. Liu",
booktitle = "Proceedings of the ACM Conference on Computer and Communications Security",

}

TY - GEN

T1 - ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption

AU - Yao, Danfeng

AU - Dodis, Yevgeniy

AU - Fazio, Nelly

AU - Lysyanskaya, Anna

PY - 2004

Y1 - 2004

N2 - A forward-secure encryption scheme protects secret keys from exposure by evolving the keys with time. Forward security has several unique requirements in hierarchical identity-based encryption (HIBE) scheme: (1) users join dynamically; (2) encryption is joining-time-oblivious; (3) users evolve secret keys autonomously. We present a scalable forward-secure HIBE (fs-HIBE) scheme satisfying the above properties. We also show how our fs-HIBE scheme can be used to construct a forward-secure public-key broadcast encryption scheme, which protects the secrecy of prior transmissions in the broadcast encryption setting. We further generalize fs-HIBE into a collusion-resistant multiple hierarchical ID-based encryption scheme, which can be used for secure communications with entities having multiple roles in role-based access control. The security of our schemes is based on the bilinear Diffie-Hellman assumption in the random oracle model.

AB - A forward-secure encryption scheme protects secret keys from exposure by evolving the keys with time. Forward security has several unique requirements in hierarchical identity-based encryption (HIBE) scheme: (1) users join dynamically; (2) encryption is joining-time-oblivious; (3) users evolve secret keys autonomously. We present a scalable forward-secure HIBE (fs-HIBE) scheme satisfying the above properties. We also show how our fs-HIBE scheme can be used to construct a forward-secure public-key broadcast encryption scheme, which protects the secrecy of prior transmissions in the broadcast encryption setting. We further generalize fs-HIBE into a collusion-resistant multiple hierarchical ID-based encryption scheme, which can be used for secure communications with entities having multiple roles in role-based access control. The security of our schemes is based on the bilinear Diffie-Hellman assumption in the random oracle model.

KW - Broadcast Encryption

KW - Forward security

KW - ID-Based Encryption

UR - http://www.scopus.com/inward/record.url?scp=14844297376&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=14844297376&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:14844297376

SP - 354

EP - 363

BT - Proceedings of the ACM Conference on Computer and Communications Security

A2 - Pfitzmann, B.

A2 - Liu, P.

ER -