JOURNAL ARTICLE

Revocable hierarchical identity-based broadcast encryption

Dawei LiJianwei LiuZongyang ZhangQianhong WuWeiran Liu

Year: 2018 Journal:   Tsinghua Science & Technology Vol: 23 (5)Pages: 539-549   Publisher: Tsinghua University Press

Abstract

Hierarchical Identity-Based Broadcast Encryption (HIBBE) organizes users into a tree-like structure, and it allows users to delegate their decryption ability to subordinates and enable encryption to any subset of users while only intended users can decrypt. However, current HIBBE schemes do not support efficient revocation of private keys. Here, a new primitive called Revocable Hierarchical Identity-Based Broadcast Encryption (RHIBBE) is formalized that allows revocation of the HIBBE. Ciphertext indistinguishability is defined against the selectively Bounded Revocable Identity-Vector-Set and Chosen-Plaintext Attack (IND-sBRIVS-CPA). An IND-sBRIVS-CPA secure RHIBBE scheme is constructed with efficient revocation on prime-order bilinear groups. The unbounded version of the scheme is also shown to be secure but a little weaker than the former under the decisional n-Weak Bilinear Diffie-Hellman inversion assumption.

Keywords:
Plaintext Revocation Delegate Broadcast encryption Encryption Computer science Ciphertext Identity (music) Plaintext-aware encryption Computer security Theoretical computer science Deterministic encryption Public-key cryptography Overhead (engineering)

Metrics

13
Cited By
1.39
FWCI (Field Weighted Citation Impact)
47
Refs
0.84
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Complexity and Algorithms in Graphs
Physical Sciences →  Computer Science →  Computational Theory and Mathematics
Cryptography and Residue Arithmetic
Physical Sciences →  Computer Science →  Information Systems

Related Documents

JOURNAL ARTICLE

Revocable hierarchical identity-based encryption

Jae Hong SeoKeita Emura

Journal:   Theoretical Computer Science Year: 2014 Vol: 542 Pages: 44-62
BOOK-CHAPTER

Hierarchical Identity-Based Broadcast Encryption

Weiran LiuJianwei LiuQianhong WuBo Qin

Lecture notes in computer science Year: 2014 Pages: 242-257
BOOK-CHAPTER

Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption

Jae Hong SeoKeita Emura

Lecture notes in computer science Year: 2015 Pages: 21-38
© 2026 ScienceGate Book Chapters — All rights reserved.