Identity-based hierarchical designated decryption

Shu Hui Chang, Chuan Ming Li, Tzonelih Hwang

Research output: Contribution to journalArticlepeer-review

Abstract

This paper presents an identity-based hierarchical designated decryption (IHDD) scheme which allows a message sender to generate ciphertexts that can be decrypted by (1) only a specified recipient or (2) a specified recipient and all or some of its ancestor users in the hierarchy tree. The newly proposed scheme can be considered as a combination of the hierarchical identity-based encryption (HIBE) and the identity-based multirecipient encryption scheme (ID-based MRES). However, the purpose and structure of the proposed IHDD scheme are different from those of the HIBE and the ID-based MRES. The proposed IHDD scheme has low computation complexity, in which the decryption operation needs only one bilinear pairing computation, and constant length private keys wherein the length of users' private keys is independent of the hierarchy depth. The security of the proposed scheme is based on the decision bilinear Diffie-Hellman inversion assumption without using random oracles.

Original languageEnglish
Pages (from-to)1243-1259
Number of pages17
JournalJournal of Information Science and Engineering
Volume26
Issue number4
Publication statusPublished - 2010 Jul 1

All Science Journal Classification (ASJC) codes

  • Software
  • Human-Computer Interaction
  • Hardware and Architecture
  • Library and Information Sciences
  • Computational Theory and Mathematics

Fingerprint Dive into the research topics of 'Identity-based hierarchical designated decryption'. Together they form a unique fingerprint.

Cite this