In Biskup, J. & López, J., editors, *Computer Security – ESORICS 2007*, of *Lecture Notes in Computer Science*, pages 139--154. Springer Berlin Heidelberg, January, 2007. 00066

Paper abstract bibtex

Paper abstract bibtex

In this paper, we introduce a new primitive called identitybased encryption with wildcard key derivation (WKD-IBE, or “wicked IBE”) that enhances the concept of hierarchical identity-based encryption (HIBE) by allowing more general key delegation patterns. A secret key is derived for a vector of identity strings, where entries can be left blank using a wildcard. This key can then be used to derive keys for any pattern that replaces wildcards with concrete identity strings. For example, one may want to allow the university’s head system administrator to derive secret keys (and hence the ability to decrypt) for all departmental sysadmin email addresses sysadmin@*.univ.edu, where * is a wildcard that can be replaced with any string. We provide appropriate security notions and provably secure instantiations with different tradeoffs in terms of ciphertext size and efficiency. We also present a generic construction of identity-based broadcast encryption (IBBE) from any WKD-IBE scheme. One of our instantiation yields an IBBE scheme with constant ciphertext size.

@incollection{abdalla_generalized_2007, series = {Lecture {Notes} in {Computer} {Science}}, title = {Generalized {Key} {Delegation} for {Hierarchical} {Identity}-{Based} {Encryption}}, copyright = {©2007 Springer-Verlag Berlin Heidelberg}, isbn = {978-3-540-74834-2 978-3-540-74835-9}, url = {http://link.springer.com/chapter/10.1007/978-3-540-74835-9_10}, abstract = {In this paper, we introduce a new primitive called identitybased encryption with wildcard key derivation (WKD-IBE, or “wicked IBE”) that enhances the concept of hierarchical identity-based encryption (HIBE) by allowing more general key delegation patterns. A secret key is derived for a vector of identity strings, where entries can be left blank using a wildcard. This key can then be used to derive keys for any pattern that replaces wildcards with concrete identity strings. For example, one may want to allow the university’s head system administrator to derive secret keys (and hence the ability to decrypt) for all departmental sysadmin email addresses sysadmin@*.univ.edu, where * is a wildcard that can be replaced with any string. We provide appropriate security notions and provably secure instantiations with different tradeoffs in terms of ciphertext size and efficiency. We also present a generic construction of identity-based broadcast encryption (IBBE) from any WKD-IBE scheme. One of our instantiation yields an IBBE scheme with constant ciphertext size.}, language = {en}, number = {4734}, urldate = {2014-12-25TZ}, booktitle = {Computer {Security} – {ESORICS} 2007}, publisher = {Springer Berlin Heidelberg}, author = {Abdalla, Michel and Kiltz, Eike and Neven, Gregory}, editor = {Biskup, Joachim and López, Javier}, month = jan, year = {2007}, note = {00066}, keywords = {Computer Communication Networks, Computers and Society, Data Encryption, Database Management, Management of Computing and Information Systems, Operating Systems}, pages = {139--154} }

Downloads: 0