Presentation 2002/9/13
How to Deal with Key Exposure in Identity-Based Schemes
Yumiko HANAOKA, Goichiro HANAOKA, Junji SHIKATA, Hideki IMAI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) In this paper, we study revocation of private keys in identity-based schemes. Especially, our work focuses on comparing the difference between identity-based schemes and conventional public key schemes, and, as a result, we show that communication cost for identity-based schemes with revocability of users' keys will be at least equivalent to the communication cost required for conventional public key schemes. This implies that one of the advantageous properties of identity-based schemes is in fact, lost in practical situations as revocation. Another contribution that we made to this work is to propose a generalized method for revocation of private keys in identity-based schemes. Our proposed scheme can be applied to arbitrary identity-based schemes and this method is also shown to be optimal in terms of communication cost. We further give a security analysis of our proposed scheme and show that an identity-based scheme of which our revocation scheme is applied to will be secure if the underlying identity-based scheme is secure. Specifically, we present a method of choosing system parameters for such a scheme in achieving the same level of security as the underlying scheme. As a concrete implementation of our method, it is applied to a couple of well-known identity-based schemes, i.e. Boneh and Franklin's identity-based encryption and Blom's identity-based key distribution, and security of each schemes are addressed as well.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Identity-based schemes / Renewal of private keys
Paper # ISEC2002-68
Date of Issue

Conference Information
Committee ISEC
Conference Date 2002/9/13(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) How to Deal with Key Exposure in Identity-Based Schemes
Sub Title (in English)
Keyword(1) Identity-based schemes
Keyword(2) Renewal of private keys
1st Author's Name Yumiko HANAOKA
1st Author's Affiliation Multimedia Laboratories, NTT DoCoMo, Inc.()
2nd Author's Name Goichiro HANAOKA
2nd Author's Affiliation Institute of Industrial Science, University of Tokyo:Reseach Fellow of Japan Society of the Promotion of Science
3rd Author's Name Junji SHIKATA
3rd Author's Affiliation Graduate School of Environment and Information Sciences, Yokohama National University
4th Author's Name Hideki IMAI
4th Author's Affiliation Institute of Industrial Science, University of Tokyo
Date 2002/9/13
Paper # ISEC2002-68
Volume (vol) vol.102
Number (no) 323
Page pp.pp.-
#Pages 8
Date of Issue