Practical parallel key-insulated encryption with multiple helper keys

Abstract Parallel key-insulated encryption (PKIE) usually allows two independent helper keys to be alternately used in temporary secret key update operations. At least half of temporary secret keys would be exposed and at least half of ciphertexts could be decrypted if one of the helper keys is exposed. In this paper, we propose a new PKIE scheme with m helper keys, where m ∈ Z , m > 2 . If one of the helper keys is exposed, only 1 / m temporary secret keys would be exposed and 1 / m ciphertexts could be decrypted, so the new PKIE scheme can greatly decrease loss due to key-exposure. The scheme is provably secure without random oracles based on a bilinear group of composite order. Most important, the scheme is practical and much more efficient than the extended ones from the previous PKIE schemes.

[1]  Masao Mukaidono,et al.  Selection of Model in Developing Information Security Criteria on Smart Grid Security System , 2011, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops.

[2]  Brent Waters,et al.  Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..

[3]  Shouhuai Xu,et al.  Strong Key-Insulated Signature Schemes , 2003, Public Key Cryptography.

[4]  M. Taheri,et al.  A secure method on a routing protocol for ad hoc networks , 2010, 2010 International Conference on Educational and Network Technology.

[5]  Hideki Imai,et al.  Parallel Key-Insulated Public Key Encryption , 2006, Public Key Cryptography.

[6]  Moti Yung,et al.  Parallel Key-Insulated Public Key Encryption Without Random Oracles , 2007, Public Key Cryptography.

[7]  Bing He,et al.  On secure communication in integrated heterogeneous wireless networks , 2010, Int. J. Inf. Technol. Commun. Convergence.

[8]  Jian Weng,et al.  Identity-Based Threshold Key-Insulated Encryption without Random Oracles , 2008, CT-RSA.

[9]  Allison Bishop,et al.  New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts , 2010, IACR Cryptol. ePrint Arch..

[10]  Yanli Ren,et al.  CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles , 2010, J. Syst. Softw..

[11]  Shiuh-Jeng Wang,et al.  Hierarchical key derivation scheme for group-oriented communication systems , 2010, Int. J. Inf. Technol. Commun. Convergence.

[12]  Koutarou Suzuki,et al.  Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts , 2011, IACR Cryptol. ePrint Arch..

[13]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[14]  Jian Weng,et al.  Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction , 2006, INDOCRYPT.

[15]  Shouhuai Xu,et al.  Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.

[16]  Ran Canetti,et al.  The random oracle methodology, revisited , 2000, JACM.

[17]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[18]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..