{"title":"T-HIBE: OSN隐私保护的可信HIBE方案","authors":"Peixin Chen, Xiaofeng Wang, Jinshu Su","doi":"10.1109/SocialSec2015.11","DOIUrl":null,"url":null,"abstract":"The Hierarchical Identity-Based Encryption (HIBE) scheme can efficiently provide confidential communication and privacy protection to online social networks. However, the inherent key escrow problem and the secure key distributing problem primarily hinder the widespread adoption of the cryptographic scheme in practice. To address the key escrow problem, this paper introduces a provably secure escrow-free model, which employs multiple Key Privacy Authorities (KPAs) to restrict the power of Public Key Generators (PKGs) in HIBE scheme. To achieve the goal of secure key distributing, this paper proposes an efficient mechanism which imposes user calculated blinding factors when distributing private keys. We instantiate the proposed model into an trustworthy and secure HIBE scheme called T-HIBE scheme, and prove that the scheme is IND-ID-CCA secure under standard model.","PeriodicalId":121098,"journal":{"name":"2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"T-HIBE: A Trustworthy HIBE Scheme for the OSN Privacy Protection\",\"authors\":\"Peixin Chen, Xiaofeng Wang, Jinshu Su\",\"doi\":\"10.1109/SocialSec2015.11\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Hierarchical Identity-Based Encryption (HIBE) scheme can efficiently provide confidential communication and privacy protection to online social networks. However, the inherent key escrow problem and the secure key distributing problem primarily hinder the widespread adoption of the cryptographic scheme in practice. To address the key escrow problem, this paper introduces a provably secure escrow-free model, which employs multiple Key Privacy Authorities (KPAs) to restrict the power of Public Key Generators (PKGs) in HIBE scheme. To achieve the goal of secure key distributing, this paper proposes an efficient mechanism which imposes user calculated blinding factors when distributing private keys. We instantiate the proposed model into an trustworthy and secure HIBE scheme called T-HIBE scheme, and prove that the scheme is IND-ID-CCA secure under standard model.\",\"PeriodicalId\":121098,\"journal\":{\"name\":\"2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SocialSec2015.11\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SocialSec2015.11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
T-HIBE: A Trustworthy HIBE Scheme for the OSN Privacy Protection
The Hierarchical Identity-Based Encryption (HIBE) scheme can efficiently provide confidential communication and privacy protection to online social networks. However, the inherent key escrow problem and the secure key distributing problem primarily hinder the widespread adoption of the cryptographic scheme in practice. To address the key escrow problem, this paper introduces a provably secure escrow-free model, which employs multiple Key Privacy Authorities (KPAs) to restrict the power of Public Key Generators (PKGs) in HIBE scheme. To achieve the goal of secure key distributing, this paper proposes an efficient mechanism which imposes user calculated blinding factors when distributing private keys. We instantiate the proposed model into an trustworthy and secure HIBE scheme called T-HIBE scheme, and prove that the scheme is IND-ID-CCA secure under standard model.