Abstract
In this paper, based on hierarchical identity-based encryption (HIBE) and combined with Key isolation mechanism (IKE), a new hierarchical key update algorithm is proposed. Above all, the security mechanism based on private key update on IKE is demonstrated; then a new encryption model (HIBE-IKE) is constructed, which combines hierarchical identity-based encryption and private Key isolation mechanism and provides a new Private key update method to solve the problems of private key update based on identity-based encryption system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002)
Dodis, Y., Katz, J., Xu, S.: Key-insulated public-key cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 65–82. Springer, Heidelberg (2002)
Lewko, A., Waters, B.: New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 455–479. Springer, Heidelberg (2010)
Gentry, C., Halevi, S.: Hierarchical identity based encryption with polynomially many levels. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 437–456. Springer, Heidelberg (2009)
Ren, Y., Gu, D.: Key-insulated encryption without random oracles. Journal of Systems and Software 83(1), 153–162 (2010)
Ohtake, G., Hanaoka, G., Ogawa, K.: An Efficient Strong Key-Insulated Signature Scheme and Its Application. In: Mjølsnes, S.F., Mauw, S., Katsikas, S.K. (eds.) EuroPKI 2008. LNCS, vol. 5057, pp. 150–165. Springer, Heidelberg (2008)
Lu, H.-J., Su, Y.-X., Zhu, Y.-F.: Distribution of random session key based on key-insulated public-key cryptosystems. Wuhan University Journal of Natural Sciences 10(1), 251–254 (2005)
Hanaoka, Y., Hanaoka, G., Shikata, J., Imai, H.: Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 495–514. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lu, X., Deng, F. (2011). The Key Update Algorithm Based on HIBE. In: Dai, M. (eds) Innovative Computing and Information. ICCIC 2011. Communications in Computer and Information Science, vol 232. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23998-4_42
Download citation
DOI: https://doi.org/10.1007/978-3-642-23998-4_42
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23997-7
Online ISBN: 978-3-642-23998-4
eBook Packages: Computer ScienceComputer Science (R0)