HOME JOURNALS CONTACT

Journal of Software Engineering

Year: 2016 | Volume: 10 | Issue: 3 | Page No.: 279-284
DOI: 10.3923/jse.2016.279.284
On Delegating Private Key Derivation in Hierarchical Identity Based Encryption and Related Encryption Privacy
Jian-Wu Zheng, Jing Zhao and Xin-Ping Guan

Abstract: As of Hierarchical Identity Based Encryption (HIBE) systems, there are two important tasks should be accomplished properly, the first one is to establish logically hierarchical relationship between entities in the hierarchy tree, which is essentially accomplished through private key derivation by delegating responsibilities to lower-level PKGs and the other task is to achieve encryption privacy of ciphertext targeting an intended recipient. In this study, mechanisms of private key derivation in HIBE systems are classified, which explicitly define how and to what extent an entity in the hierarchy takes its level PKGs role of generating valid private keys for its descendants in the hierarchy. Moreover, a new delegation mechanism, authorized delegation is introduced, which can prevent any entity from deriving private keys for its descendants with use of its private key and delegate the responsibility of generating private keys for a specified entity through authorization by distributing a specific secret to an entity as an ancestor of the specified entity by the root PKG (primitive authorization) or some other authorized entities (chained authorization). As for encryption privacy of ciphertext in a HIBE system, which measures the possibility that ciphertexts targeting an entity are successfully decrypted by its ancestors or descendants, the encryption privacy is studied from two distinct perspectives, i.e., private key derivation perspective and private key legitimacy perspective. Furthermore, dominated encryption privacy and dedicated encryption privacy are defined and discussed from private key legitimacy perspective.

Fulltext PDF Fulltext HTML

How to cite this article
Jian-Wu Zheng, Jing Zhao and Xin-Ping Guan, 2016. On Delegating Private Key Derivation in Hierarchical Identity Based Encryption and Related Encryption Privacy. Journal of Software Engineering, 10: 279-284.

© Science Alert. All Rights Reserved