Identity-Based Encryption with Verifiable Outsourced Revocation

Yanli Ren,Ning Ding,Xinpeng Zhang,Haining Lu,Dawu Gu
DOI: https://doi.org/10.1093/comjnl/bxw029
2016-01-01
The Computer Journal
Abstract:In an identity-based encryption (IBE) scheme, how to revoke users from the system is a difficult problem when their private keys are compromised. The private key generator (PKG) updates the private keys for all unrevoked users and has high computation load when a large number of users are included. We propose an IBE scheme with verifiable outsourced revocation based on the one-malicious model of two servers. In the proposed scheme, PKG delegates the key update operations to the two servers for all unrevoked users. The PKG can detect the failure with probability 1 if one of the servers misbehaves. Our scheme is proven fully secure and verifiable against chosenplaintext attack (CPA) without random oracles. The servers cannot execute the key update operations for any revoked user even if they collude. The experiment shows the time cost for PKG in the outsourcing algorithm is much smaller than that for directly updating the private keys for all unrevoked users.
What problem does this paper attempt to address?