Title :
Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption
Author :
Abdalla, Michel ; De Caro, Angelo ; Phan, Duong Hieu
Author_Institution :
Dept. d´´Inf., Ecole Normale Super., Paris, France
Abstract :
Inspired by the fact that many e-mail addresses correspond to groups of users, Abdalla introduced the notion of identity-based encryption with wildcards (WIBE), which allows a sender to simultaneously encrypt messages to a group of users matching a certain pattern, defined as a sequence of identity strings and wildcards. This notion was later generalized by Abdalla, Kiltz, and Neven, who considered more general delegation patterns during the key derivation process. Despite its many applications, current constructions have two significant limitations: 1) they are only known to be fully secure when the maximum hierarchy depth is a constant; and 2) they do not hide the pattern associated with the ciphertext. To overcome these, this paper offers two new constructions. First, we show how to convert a WIBE scheme of Abdalla into a (nonanonymous) WIBE scheme with generalized key delegation (WW-IBE) that is fully secure even for polynomially many levels. Then, to achieve anonymity, we initially consider hierarchical predicate encryption (HPE) schemes with more generalized forms of key delegation and use them to construct an anonymous WW-IBE scheme. Finally, to instantiate the former, we modify the HPE scheme of Lewko to allow for more general key delegation patterns. Our proofs are in the standard model and use existing complexity assumptions.
Keywords :
computational complexity; cryptography; HPE; WIBE scheme; WW-IBE scheme; ciphertext; complexity assumptions; delegation patterns; e-mail addresses; generalized key delegation; hierarchical predicate encryption schemes; identity-based encryption with wildcards; inner-product encryption; key derivation process; maximum hierarchy depth; wildcarded identity-based encryption; Electronic mail; Encryption; Identity-based encryption; Standards; Anonymity; inner-product encryption; wildcarded identity-based encryption;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2012.2213594