Accountable Authority Identity-Based Encryption with Public Traceability
At Crypto’07, Goyal introduced the notion of accountable authority identity-based encryption (A-IBE) in order to mitigate the inherent key escrow problem in identity-based encryption, and proposed two concrete constructions. In an A-IBE system, if the private key generator (PKG) distributes a decryp...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2013
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1943 https://ink.library.smu.edu.sg/context/sis_research/article/2942/viewcontent/Lai2013_Chapter_AccountableAuthorityIdentity_pv.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-2942 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-29422022-02-16T09:15:11Z Accountable Authority Identity-Based Encryption with Public Traceability LAI, Junzuo DENG, Robert H. ZHAO, Yunlei Weng, Jian At Crypto’07, Goyal introduced the notion of accountable authority identity-based encryption (A-IBE) in order to mitigate the inherent key escrow problem in identity-based encryption, and proposed two concrete constructions. In an A-IBE system, if the private key generator (PKG) distributes a decryption key or produces an unauthorized decryption box for a user maliciously, it runs the risk of being caught and sued in the court of law with the help of a tracing algorithm. Subsequent efforts focused on constructions of A-IBE schemes with enhanced security. In these A-IBE constructions, the tracing algorithm needs to take a user’s decryption key as input. If the user lost his key or is deliberately uncooperative in court, then we cannot implicate the PKG or the user. An interesting open problem left by Goyal et al. at CCS’08 is to consider the possibility of tracing a decryption box using only a public tracing key, or with the assistance of a tracing authority. In this paper, we address this problem positively. We first extend the original model of A-IBE to accommodate public traceability, and then propose an A-IBE scheme in the new model. To the best of our knowledge, the proposed scheme is the first A-IBE with public traceability. 2013-03-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1943 info:doi/10.1007/978-3-642-36095-4_21 https://ink.library.smu.edu.sg/context/sis_research/article/2942/viewcontent/Lai2013_Chapter_AccountableAuthorityIdentity_pv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Accountable Authority Identity-Based Encryption Public Traceability Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Accountable Authority Identity-Based Encryption Public Traceability Information Security |
spellingShingle |
Accountable Authority Identity-Based Encryption Public Traceability Information Security LAI, Junzuo DENG, Robert H. ZHAO, Yunlei Weng, Jian Accountable Authority Identity-Based Encryption with Public Traceability |
description |
At Crypto’07, Goyal introduced the notion of accountable authority identity-based encryption (A-IBE) in order to mitigate the inherent key escrow problem in identity-based encryption, and proposed two concrete constructions. In an A-IBE system, if the private key generator (PKG) distributes a decryption key or produces an unauthorized decryption box for a user maliciously, it runs the risk of being caught and sued in the court of law with the help of a tracing algorithm. Subsequent efforts focused on constructions of A-IBE schemes with enhanced security. In these A-IBE constructions, the tracing algorithm needs to take a user’s decryption key as input. If the user lost his key or is deliberately uncooperative in court, then we cannot implicate the PKG or the user. An interesting open problem left by Goyal et al. at CCS’08 is to consider the possibility of tracing a decryption box using only a public tracing key, or with the assistance of a tracing authority. In this paper, we address this problem positively. We first extend the original model of A-IBE to accommodate public traceability, and then propose an A-IBE scheme in the new model. To the best of our knowledge, the proposed scheme is the first A-IBE with public traceability. |
format |
text |
author |
LAI, Junzuo DENG, Robert H. ZHAO, Yunlei Weng, Jian |
author_facet |
LAI, Junzuo DENG, Robert H. ZHAO, Yunlei Weng, Jian |
author_sort |
LAI, Junzuo |
title |
Accountable Authority Identity-Based Encryption with Public Traceability |
title_short |
Accountable Authority Identity-Based Encryption with Public Traceability |
title_full |
Accountable Authority Identity-Based Encryption with Public Traceability |
title_fullStr |
Accountable Authority Identity-Based Encryption with Public Traceability |
title_full_unstemmed |
Accountable Authority Identity-Based Encryption with Public Traceability |
title_sort |
accountable authority identity-based encryption with public traceability |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2013 |
url |
https://ink.library.smu.edu.sg/sis_research/1943 https://ink.library.smu.edu.sg/context/sis_research/article/2942/viewcontent/Lai2013_Chapter_AccountableAuthorityIdentity_pv.pdf |
_version_ |
1770571692828000256 |