Presentation | 2002/9/13 How to Deal with Key Exposure in Identity-Based Schemes Yumiko HANAOKA, Goichiro HANAOKA, Junji SHIKATA, Hideki IMAI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | In this paper, we study revocation of private keys in identity-based schemes. Especially, our work focuses on comparing the difference between identity-based schemes and conventional public key schemes, and, as a result, we show that communication cost for identity-based schemes with revocability of users' keys will be at least equivalent to the communication cost required for conventional public key schemes. This implies that one of the advantageous properties of identity-based schemes is in fact, lost in practical situations as revocation. Another contribution that we made to this work is to propose a generalized method for revocation of private keys in identity-based schemes. Our proposed scheme can be applied to arbitrary identity-based schemes and this method is also shown to be optimal in terms of communication cost. We further give a security analysis of our proposed scheme and show that an identity-based scheme of which our revocation scheme is applied to will be secure if the underlying identity-based scheme is secure. Specifically, we present a method of choosing system parameters for such a scheme in achieving the same level of security as the underlying scheme. As a concrete implementation of our method, it is applied to a couple of well-known identity-based schemes, i.e. Boneh and Franklin's identity-based encryption and Blom's identity-based key distribution, and security of each schemes are addressed as well. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Identity-based schemes / Renewal of private keys |
Paper # | ISEC2002-68 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2002/9/13(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | How to Deal with Key Exposure in Identity-Based Schemes |
Sub Title (in English) | |
Keyword(1) | Identity-based schemes |
Keyword(2) | Renewal of private keys |
1st Author's Name | Yumiko HANAOKA |
1st Author's Affiliation | Multimedia Laboratories, NTT DoCoMo, Inc.() |
2nd Author's Name | Goichiro HANAOKA |
2nd Author's Affiliation | Institute of Industrial Science, University of Tokyo:Reseach Fellow of Japan Society of the Promotion of Science |
3rd Author's Name | Junji SHIKATA |
3rd Author's Affiliation | Graduate School of Environment and Information Sciences, Yokohama National University |
4th Author's Name | Hideki IMAI |
4th Author's Affiliation | Institute of Industrial Science, University of Tokyo |
Date | 2002/9/13 |
Paper # | ISEC2002-68 |
Volume (vol) | vol.102 |
Number (no) | 323 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |