Traceable and retrievable identity-based encryption

Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. This concept enables some mechanisms to reduce the trust of a private key generator (PKG) in an IBE system. The aim of this paper...

Full description

Saved in:
Bibliographic Details
Main Authors: AU, Man Ho, HUANG, Qiong, LIU, Joseph K., SUSILO, Willy, WONG, Duncan S., YANG, Guomin
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2008
Subjects:
PKG
Online Access:https://ink.library.smu.edu.sg/sis_research/7383
https://ink.library.smu.edu.sg/context/sis_research/article/8386/viewcontent/traceable.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-8386
record_format dspace
spelling sg-smu-ink.sis_research-83862023-08-21T03:18:13Z Traceable and retrievable identity-based encryption AU, Man Ho HUANG, Qiong LIU, Joseph K. SUSILO, Willy WONG, Duncan S. YANG, Guomin Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. This concept enables some mechanisms to reduce the trust of a private key generator (PKG) in an IBE system. The aim of this paper is threefold. First, we discuss some subtleties in the first traceable IBE scheme in the Crypto 2007 paper. Second, we present an extension to this work by having the PKG’s master secret key retrieved automatically if more than one user secret key are released. This way, the user can produce a concrete proof of misbehaviour of the PKG in the court. In contrast to previous approach, our idea gives strong incentive for the PKG to strengthen the security of the system since if someone can successfully release a user’s secret key, it means that his security is also compromised. We present a formal model to capture our idea. Third, we present an efficient construction based on Gentry’s IBE that satisfies our model and prove its security. Our construction is proven secure in the random oracle model. Nevertheless, we should emphasize that the aim of this paper is to introduce the new model to strengthen the IBE system. 2008-06-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7383 info:doi/10.1007/978-3-540-68914-0_6 https://ink.library.smu.edu.sg/context/sis_research/article/8386/viewcontent/traceable.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Identity-based Encryption PKG Retrievability Traceability Trust Information Security OS and Networks
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Identity-based Encryption
PKG
Retrievability
Traceability
Trust
Information Security
OS and Networks
spellingShingle Identity-based Encryption
PKG
Retrievability
Traceability
Trust
Information Security
OS and Networks
AU, Man Ho
HUANG, Qiong
LIU, Joseph K.
SUSILO, Willy
WONG, Duncan S.
YANG, Guomin
Traceable and retrievable identity-based encryption
description Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. This concept enables some mechanisms to reduce the trust of a private key generator (PKG) in an IBE system. The aim of this paper is threefold. First, we discuss some subtleties in the first traceable IBE scheme in the Crypto 2007 paper. Second, we present an extension to this work by having the PKG’s master secret key retrieved automatically if more than one user secret key are released. This way, the user can produce a concrete proof of misbehaviour of the PKG in the court. In contrast to previous approach, our idea gives strong incentive for the PKG to strengthen the security of the system since if someone can successfully release a user’s secret key, it means that his security is also compromised. We present a formal model to capture our idea. Third, we present an efficient construction based on Gentry’s IBE that satisfies our model and prove its security. Our construction is proven secure in the random oracle model. Nevertheless, we should emphasize that the aim of this paper is to introduce the new model to strengthen the IBE system.
format text
author AU, Man Ho
HUANG, Qiong
LIU, Joseph K.
SUSILO, Willy
WONG, Duncan S.
YANG, Guomin
author_facet AU, Man Ho
HUANG, Qiong
LIU, Joseph K.
SUSILO, Willy
WONG, Duncan S.
YANG, Guomin
author_sort AU, Man Ho
title Traceable and retrievable identity-based encryption
title_short Traceable and retrievable identity-based encryption
title_full Traceable and retrievable identity-based encryption
title_fullStr Traceable and retrievable identity-based encryption
title_full_unstemmed Traceable and retrievable identity-based encryption
title_sort traceable and retrievable identity-based encryption
publisher Institutional Knowledge at Singapore Management University
publishDate 2008
url https://ink.library.smu.edu.sg/sis_research/7383
https://ink.library.smu.edu.sg/context/sis_research/article/8386/viewcontent/traceable.pdf
_version_ 1779156896546029568