Advertisement

A Novel Identity-Based Key Management and Encryption Scheme for Distributed System

  • Geng Yang
  • Qiang Zhou
  • Xiaolong Xu
  • Jian Xu
  • Chunming Rong
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7672)

Abstract

The paper proposes a Distributed Identity-Based Encryption (DIBE) scheme. The DIBE scheme extends the traditional IBE to a distributed system which consists of some homogenous or heterogeneous subsystems. Each subsystem has its own different master key and can communicate each other in a secure mode, instead of sharing a common master key as that in a traditional IBE scheme. The paper presents and analyzes the key distributing algorithms for a subsystem to join or leave a system, and also a user to joining or leave a subsystem. It shows that the DIBE scheme has the properties of scalability and adaptability. The paper also analyzes the security and performance of the proposed scheme, including the correctness, complexity and application examples. Some simulation results demonstrate the performance of the DIBE by using the PBC function packet.

Keywords

identity-based encryption distributed system Key management network security algorithm analysis 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  2. 2.
    Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  4. 4.
    Shamir, A.: How to share a secret. ACM Communications 22(11), 612–613 (1979)MathSciNetCrossRefzbMATHGoogle Scholar
  5. 5.
    Waters, B.: Efficient Identity-Based Encryption Without Random Oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  6. 6.
    Agrawal, S., Boneh, D., Boyen, X.: Efficient Lattice (H)IBE in the Standard Model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 553–572. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  7. 7.
    Boyen, X., Waters, B.: Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 290–307. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  8. 8.
    Waters, B.: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619–636. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  9. 9.
    Wang, P., Lin, J.: Mediated Hierarchical Identity-Based Combined Public Key Schemes. In: 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (IITSI), pp. 614–618 (April 2010)Google Scholar
  10. 10.
    Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  11. 11.
    Kate, A., Goldberg, I.: Distributed Private-Key Generators for Identity-Based Cryptography. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 436–453. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  12. 12.
    Abdalla, M., Boyen, X., Chevalier, C., Pointcheval, D.: Distributed Public-Key Cryptography from Weak Secrets. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 139–159. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  13. 13.
    Barreto, P.S.L.M., Gallbraith, S., et al.: Efficient pairing computation on supersingular Abelian varieties. Designs, Codes and Cryptography 42(3), 239–271 (2007)MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Geng Yang
    • 1
  • Qiang Zhou
    • 1
    • 2
  • Xiaolong Xu
    • 1
    • 3
  • Jian Xu
    • 1
  • Chunming Rong
    • 4
  1. 1.College of ComputerNanjing University of Posts & TelecommunicationsNanjingChina
  2. 2.College of Computer and Information EngineeringChuzhou UniversityChuzhouChina
  3. 3.State Key Laboratory for Novel Software TechnologyNanjing UniversityNanjingChina
  4. 4.Department of Computer ScienceUniversity of StavangerStavangerNorway

Personalised recommendations