In the Identity-Based Encryption (IBE) setting, the rejoin functionality seems to be impossible since each user has the unique identity as its public key. Moreover, sometimes these identities are unchangeable, e.g., biological information (finger print iris, and so on) is regarded as the identity. Even if changeable value is indicated as an identity, e.g., e-mail address, it is preferable that the same identity can be used after a secret key is leaked. In this paper, we give a formal security definition of RIBE with the rejoin functionality, and also show that the Seo-Emura RIBE scheme [PKC 2013] (with a slight modification) has the rejoin functionality.
Jae Hong SEO
Myongji University
Keita EMURA
National Institute of Information and Communications Technology (NICT)
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Jae Hong SEO, Keita EMURA, "Revocable Identity-Based Encryption with Rejoin Functionality" in IEICE TRANSACTIONS on Fundamentals,
vol. E97-A, no. 8, pp. 1806-1809, August 2014, doi: 10.1587/transfun.E97.A.1806.
Abstract: In the Identity-Based Encryption (IBE) setting, the rejoin functionality seems to be impossible since each user has the unique identity as its public key. Moreover, sometimes these identities are unchangeable, e.g., biological information (finger print iris, and so on) is regarded as the identity. Even if changeable value is indicated as an identity, e.g., e-mail address, it is preferable that the same identity can be used after a secret key is leaked. In this paper, we give a formal security definition of RIBE with the rejoin functionality, and also show that the Seo-Emura RIBE scheme [PKC 2013] (with a slight modification) has the rejoin functionality.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E97.A.1806/_p
Copy
@ARTICLE{e97-a_8_1806,
author={Jae Hong SEO, Keita EMURA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Revocable Identity-Based Encryption with Rejoin Functionality},
year={2014},
volume={E97-A},
number={8},
pages={1806-1809},
abstract={In the Identity-Based Encryption (IBE) setting, the rejoin functionality seems to be impossible since each user has the unique identity as its public key. Moreover, sometimes these identities are unchangeable, e.g., biological information (finger print iris, and so on) is regarded as the identity. Even if changeable value is indicated as an identity, e.g., e-mail address, it is preferable that the same identity can be used after a secret key is leaked. In this paper, we give a formal security definition of RIBE with the rejoin functionality, and also show that the Seo-Emura RIBE scheme [PKC 2013] (with a slight modification) has the rejoin functionality.},
keywords={},
doi={10.1587/transfun.E97.A.1806},
ISSN={1745-1337},
month={August},}
Copy
TY - JOUR
TI - Revocable Identity-Based Encryption with Rejoin Functionality
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1806
EP - 1809
AU - Jae Hong SEO
AU - Keita EMURA
PY - 2014
DO - 10.1587/transfun.E97.A.1806
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E97-A
IS - 8
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - August 2014
AB - In the Identity-Based Encryption (IBE) setting, the rejoin functionality seems to be impossible since each user has the unique identity as its public key. Moreover, sometimes these identities are unchangeable, e.g., biological information (finger print iris, and so on) is regarded as the identity. Even if changeable value is indicated as an identity, e.g., e-mail address, it is preferable that the same identity can be used after a secret key is leaked. In this paper, we give a formal security definition of RIBE with the rejoin functionality, and also show that the Seo-Emura RIBE scheme [PKC 2013] (with a slight modification) has the rejoin functionality.
ER -