First International IEEE Security in Storage Workshop, 2002. Proceedings.
DOI: 10.1109/sisw.2002.1183509
|View full text |Cite
|
Sign up to set email alerts
|

Exposure-resilience for free: the hierarchical ID-based encryption case

Abstract: In the problem of gradual key exposure [7]

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 29 publications
0
7
0
Order By: Relevance
“…To our knowledge, other papers that have treated "threshold decryption" in the context of ID-based cryptography are [8] and [13]. Dodis and Yung [8] observed how threshold de-cryption can be realized in Gentry and Silverberg [12]'s "hierarchical ID-based encryption" setting. Interestingly, their approach is to share a private key (not the master key of the PKG) obtained from a user at a higher level.…”
Section: Related Work and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…To our knowledge, other papers that have treated "threshold decryption" in the context of ID-based cryptography are [8] and [13]. Dodis and Yung [8] observed how threshold de-cryption can be realized in Gentry and Silverberg [12]'s "hierarchical ID-based encryption" setting. Interestingly, their approach is to share a private key (not the master key of the PKG) obtained from a user at a higher level.…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…Interestingly, their approach is to share a private key (not the master key of the PKG) obtained from a user at a higher level. Although this was inevitable in the hierarchical ID-based encryption setting and its advantage in general ID-based cryptography was not mentioned in [8], it is more sound approach than sharing the master key of the PKG as we discussed above. However, their threshold decryption scheme is very-sketched and chosen-ciphertext security for the scheme was not considered in [8].…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…In 2002, Dodis and Yung introduced an identity-based threshold decryption [5], but it is a very sketchy scheme. In [6], Libert and Quisquater suggested a first realized identity-based threshold encryption scheme, which is based on the scheme of Beneh and Frainklin [7].…”
Section: Related Workmentioning
confidence: 99%
“…The first chosen ciphertext secure identity‐based threshold decryption was designed by Baek and Zheng, but this system fixed a threshold value t when private keys for users are generated. We note that all threshold encryption schemes provided in are provably secure in the random oracle model and this could not imply the security in the real world (see ). Further researchers proposed other following works.…”
Section: Introductionmentioning
confidence: 99%
“…It does decrease the possibility of getting the keys to be exposed in the first place, however, it does not deal with what it can do after key exposure has actually occured. In [16], Dodis and Yung proposed an interesting idea that refreshes the private keys in HIBE. Their scheme provides a solution to the problem of gradual key exposure in which the private key is assumed to slowly compromise over time.…”
Section: Introductionmentioning
confidence: 99%