Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption

Abstract : Inspired by the fact that many e-mail addresses correspond to groups of users, Abdalla et al. introduced the no- tion of identity-based encryption with wildcards (WIBE), which allows a sender to simultaneously encrypt messages to a group of users matching a certain pattern, defined as a sequence of identity strings and wildcards. This notion was later generalized by Abdalla, Kiltz, and Neven, who considered more general delegation patterns during the key derivation process. Despite its many applications, current constructions have two significant limitations: 1) they are only known to be fully secure when the maximum hierarchy depth is a constant; and 2) they do not hide the pattern associated with the ciphertext. To overcome these, this paper offers two new constructions. First, we show how to convert a WIBE scheme of Abdalla et al. into a (nonanonymous) WIBE scheme with generalized key delegation (WW-IBE) that is fully secure even for polynomially many levels. Then, to achieve anonymity, we initially consider hierarchical predicate encryption (HPE) schemes with more generalized forms of key delegation and use them to construct an anonymous WW-IBE scheme. Finally, to instantiate the former, we modify the HPE scheme of Lewko et al. to allow for more general key delegation patterns. Our proofs are in the standard model and use existing complexity assumptions.
Type de document :
Article dans une revue
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2012, 7 (6), pp.1695-1706. 〈10.1109/TIFS.2012.2213594〉
Liste complète des métadonnées

https://hal.inria.fr/hal-00918522
Contributeur : Michel Abdalla <>
Soumis le : vendredi 13 décembre 2013 - 16:18:11
Dernière modification le : vendredi 25 mai 2018 - 12:02:05

Identifiants

Collections

Citation

Michel Abdalla, Angelo De Caro, Duong Hieu Phan. Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption. IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2012, 7 (6), pp.1695-1706. 〈10.1109/TIFS.2012.2213594〉. 〈hal-00918522〉

Partager

Métriques

Consultations de la notice

317