首页    期刊浏览 2024年07月08日 星期一
登录注册

文章基本信息

  • 标题:On Delegating Private Key Derivation in Hierarchical Identity Based Encryption and Related Encryption Privacy
  • 本地全文:下载
  • 作者:Jian-Wu Zheng ; Jing Zhao ; Xin-Ping Guan
  • 期刊名称:Journal of Software Engineering
  • 印刷版ISSN:1819-4311
  • 电子版ISSN:2152-0941
  • 出版年度:2016
  • 卷号:10
  • 期号:3
  • 页码:279-284
  • DOI:10.3923/jse.2016.279.284
  • 出版社:Academic Journals Inc., USA
  • 摘要:As of Hierarchical Identity Based Encryption (HIBE) systems, there are two important tasks should be accomplished properly, the first one is to establish logically hierarchical relationship between entities in the hierarchy tree, which is essentially accomplished through private key derivation by delegating responsibilities to lower-level PKGs and the other task is to achieve encryption privacy of ciphertext targeting an intended recipient. In this study, mechanisms of private key derivation in HIBE systems are classified, which explicitly define how and to what extent an entity in the hierarchy takes its level PKGs role of generating valid private keys for its descendants in the hierarchy. Moreover, a new delegation mechanism, authorized delegation is introduced, which can prevent any entity from deriving private keys for its descendants with use of its private key and delegate the responsibility of generating private keys for a specified entity through authorization by distributing a specific secret to an entity as an ancestor of the specified entity by the root PKG (primitive authorization) or some other authorized entities (chained authorization). As for encryption privacy of ciphertext in a HIBE system, which measures the possibility that ciphertexts targeting an entity are successfully decrypted by its ancestors or descendants, the encryption privacy is studied from two distinct perspectives, i.e., private key derivation perspective and private key legitimacy perspective. Furthermore, dominated encryption privacy and dedicated encryption privacy are defined and discussed from private key legitimacy perspective.
国家哲学社会科学文献中心版权所有