As Hierarchical Identity Based Encryption (HIBE) system usually maps the true institutional structure of an organization or entity relationship between objects in real world, It is important that computation & communication complexity of private key, ciphertext, cryptographic computations and so on related to an entity in the hierarchy is independent to the hierarchy depth of the entity. Moreover, key escrow problem that any non-leaf entity in a hierarchical identity based cryptosystem can derive private keys for its descendants with use of its private key should be resolved, in order to prevent any entity from behaving on behalf of its descendants. In this paper, a new technique is introduced for composing a private key for each individual entity in HIBE system by differentiating between non-local identifiers and local identifiers of the identity of the entity. That we call Identifier Discrimination. With the technique, A selective identity secure HIBE system is constructed under Decisional Bilinear Diffie-Hellman (DBDH) assumption without using random oracles, where the private key and the ciphertext consist of constant number of group elements, and decryption requires only three bilinear map computations, regardless of the identity hierarchy depth. Moreover, in contrast to previous HIBE constructions, where private key for an entity can be derived by its ancestors with direct use of their private keys, key escrow problem inherent in identity based cryptosystems is resolved in our HIBE construction. Privilege of deriving private keys for an entity can be delegated to any of its ancestors through authorization by distributing specifically crafted values to the ancestor in our HIBE system, that we call Authorized Delegation.
[1]
Brent Waters,et al.
Efficient Identity-Based Encryption Without Random Oracles
,
2005,
EUROCRYPT.
[2]
Clifford C. Cocks.
An Identity Based Encryption Scheme Based on Quadratic Residues
,
2001,
IMACC.
[3]
Allison Bishop,et al.
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
,
2010,
IACR Cryptol. ePrint Arch..
[4]
Dan Boneh,et al.
Secure Identity Based Encryption Without Random Oracles
,
2004,
CRYPTO.
[5]
Matthew K. Franklin,et al.
Identity-Based Encryption from the Weil Pairing
,
2001,
CRYPTO.
[6]
Dan Boneh,et al.
Hierarchical Identity Based Encryption with Constant Size Ciphertext
,
2005,
EUROCRYPT.
[7]
Brent Waters,et al.
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
,
2009,
IACR Cryptol. ePrint Arch..
[8]
Ben Lynn,et al.
Toward Hierarchical Identity-Based Encryption
,
2002,
EUROCRYPT.
[9]
Dan Boneh,et al.
Efficient Selective Identity-Based Encryption Without Random Oracles
,
2011,
Journal of Cryptology.
[10]
Craig Gentry,et al.
Hierarchical ID-Based Cryptography
,
2002,
ASIACRYPT.
[11]
Dan Boneh,et al.
Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles
,
2004,
IACR Cryptol. ePrint Arch..