Traceable and retrievable identity-based encryption
Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. This concept enables some mechanisms to reduce the trust of a private key generator (PKG) in an IBE system. The aim of this paper...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2008
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7383 https://ink.library.smu.edu.sg/context/sis_research/article/8386/viewcontent/traceable.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-8386 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-83862023-08-21T03:18:13Z Traceable and retrievable identity-based encryption AU, Man Ho HUANG, Qiong LIU, Joseph K. SUSILO, Willy WONG, Duncan S. YANG, Guomin Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. This concept enables some mechanisms to reduce the trust of a private key generator (PKG) in an IBE system. The aim of this paper is threefold. First, we discuss some subtleties in the first traceable IBE scheme in the Crypto 2007 paper. Second, we present an extension to this work by having the PKG’s master secret key retrieved automatically if more than one user secret key are released. This way, the user can produce a concrete proof of misbehaviour of the PKG in the court. In contrast to previous approach, our idea gives strong incentive for the PKG to strengthen the security of the system since if someone can successfully release a user’s secret key, it means that his security is also compromised. We present a formal model to capture our idea. Third, we present an efficient construction based on Gentry’s IBE that satisfies our model and prove its security. Our construction is proven secure in the random oracle model. Nevertheless, we should emphasize that the aim of this paper is to introduce the new model to strengthen the IBE system. 2008-06-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7383 info:doi/10.1007/978-3-540-68914-0_6 https://ink.library.smu.edu.sg/context/sis_research/article/8386/viewcontent/traceable.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Identity-based Encryption PKG Retrievability Traceability Trust Information Security OS and Networks |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Identity-based Encryption PKG Retrievability Traceability Trust Information Security OS and Networks |
spellingShingle |
Identity-based Encryption PKG Retrievability Traceability Trust Information Security OS and Networks AU, Man Ho HUANG, Qiong LIU, Joseph K. SUSILO, Willy WONG, Duncan S. YANG, Guomin Traceable and retrievable identity-based encryption |
description |
Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. This concept enables some mechanisms to reduce the trust of a private key generator (PKG) in an IBE system. The aim of this paper is threefold. First, we discuss some subtleties in the first traceable IBE scheme in the Crypto 2007 paper. Second, we present an extension to this work by having the PKG’s master secret key retrieved automatically if more than one user secret key are released. This way, the user can produce a concrete proof of misbehaviour of the PKG in the court. In contrast to previous approach, our idea gives strong incentive for the PKG to strengthen the security of the system since if someone can successfully release a user’s secret key, it means that his security is also compromised. We present a formal model to capture our idea. Third, we present an efficient construction based on Gentry’s IBE that satisfies our model and prove its security. Our construction is proven secure in the random oracle model. Nevertheless, we should emphasize that the aim of this paper is to introduce the new model to strengthen the IBE system. |
format |
text |
author |
AU, Man Ho HUANG, Qiong LIU, Joseph K. SUSILO, Willy WONG, Duncan S. YANG, Guomin |
author_facet |
AU, Man Ho HUANG, Qiong LIU, Joseph K. SUSILO, Willy WONG, Duncan S. YANG, Guomin |
author_sort |
AU, Man Ho |
title |
Traceable and retrievable identity-based encryption |
title_short |
Traceable and retrievable identity-based encryption |
title_full |
Traceable and retrievable identity-based encryption |
title_fullStr |
Traceable and retrievable identity-based encryption |
title_full_unstemmed |
Traceable and retrievable identity-based encryption |
title_sort |
traceable and retrievable identity-based encryption |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2008 |
url |
https://ink.library.smu.edu.sg/sis_research/7383 https://ink.library.smu.edu.sg/context/sis_research/article/8386/viewcontent/traceable.pdf |
_version_ |
1779156896546029568 |