Title: CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance
Authors: Yuu Ishida; Junji Shikata; Yohei Watanabe
Addresses: Graduate School of Environment and Information Sciences, Yokohama National University, 79-7 Tokiwadai, Hodogaya-ku, Yokohama, 240-8501, Japan ' Graduate School of Environment and Information Sciences, Yokohama National University, Japan; Institute of Advanced Sciences, Yokohama National University, 79-7 Tokiwadai, Hodogaya-ku, Yokohama, 240-8501, Japan ' Graduate School of Informatics and Engineering, The University of Electro-Communications 1-5-1 Chofugaoka, Chofu, Tokyo, 182-8585, Japan
Abstract: Key revocation functionality is important for identity-based encryption (IBE) to manage users dynamically. Revocable IBE (RIBE) realises such revocation functionality with scalability. In PKC 2013, Seo and Emura first considered decryption key exposure resistance (DKER) as a new realistic threat, and proposed the first RIBE scheme with DKER. Their RIBE scheme is adaptively secure against chosen plaintext attacks (CPA), and there is no concrete RIBE scheme adaptively secure against chosen ciphertext attacks (CCA) even without DKER so far. In this paper, we first propose three constructions of adaptively CCA-secure RIBE schemes with DKER. The first and second schemes are based on an existing transformation, which is called a BCHK transformation, that a CPA-secure hierarchical IBE scheme can be transformed into a CCA-secure scheme. The third scheme is constructed via the KEM/DEM framework. Specifically, we newly propose a revocable identity-based key encapsulation mechanism (RIB-KEM), and we show a generic construction of a CCA-secure RIBE scheme from the RIB-KEM and a data encapsulation mechanism (DEM). The third scheme is more efficient than the first and second ones in terms of the ciphertext size.
Keywords: CCA-security; revocable identity-based encryption; key encapsulation mechanism; complete subtree method; prime-order bilinear group; composite-order bilinear group; KEM/DEM framework.
International Journal of Applied Cryptography, 2017 Vol.3 No.3, pp.288 - 311
Available online: 22 Aug 2017 *Full-text access for editors Access for subscribers Purchase this article Comment on this article