Towards Anonymous Ciphertext Indistinguishability with Identity Leakage

作者: Tsz Hon Yuen , Cong Zhang , Sherman S. M. Chow , Joseph K. Liu

DOI: 10.1007/978-3-642-41227-1_8

关键词:

摘要: Key escrow is a major drawback of identity-based encryption (IBE). The key generation centre (KGC) can generate the user secret any by using master and user's identity. This paper presents systematic study what it takes to prevent malicious KGC from decrypting ciphertext encrypted for an honest user, which covers case certificateless encryption, shows impossibility ideal escrow-free IBE, unless there uncertainty in identity. Our also explains underpinning idea anonymous indistinguishability (ACI), formalized Chow PKC 2009. An ACI-secure IBE (or logical entity get holds key, such as collusion number authorities holding sufficient secret's shares) if does not know intended recipient ciphertext, guarantee that none existing attempts literature provide. The notion ACI crucially relies on privacy identity eyes KGC. only leakage allowed Chow's model via querying embedded-identity oracle. In this paper, we strengthen his allow arbitrary bounded recipient's We give generic construction how achieve when has enough entropy.

参考文章(33)
Richard A. DeMillo, Dan Boneh, Richard J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). theory and application of cryptographic techniques. pp. 37- 51 ,(1997)
Public Key Cryptography - PKC 2009 Lecture Notes in Computer Science. ,vol. 5443, ,(2009) , 10.1007/978-3-642-00468-1
Aggelos Kiayias, Moti Yung, Self Protecting Pirates and Black-Box Traitor Tracing international cryptology conference. pp. 63- 79 ,(2001) , 10.1007/3-540-44647-8_4
Craig Gentry, Certificate-based encryption and the certificate revocation problem theory and application of cryptographic techniques. pp. 272- 293 ,(2003) , 10.1007/3-540-39200-9_17
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5
Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Traceable and retrievable identity-based encryption applied cryptography and network security. pp. 94- 110 ,(2008) , 10.1007/978-3-540-68914-0_6
Sherman S. M. Chow, Removing Escrow from Identity-Based Encryption Public Key Cryptography – PKC 2009. pp. 256- 276 ,(2009) , 10.1007/978-3-642-00468-1_15
Vipul Goyal, Reducing Trust in the PKG in Identity Based Cryptosystems Advances in Cryptology - CRYPTO 2007. pp. 430- 447 ,(2007) , 10.1007/978-3-540-74143-5_24
Sattam S. Al-Riyami, Kenneth G. Paterson, Certificateless Public Key Cryptography international conference on the theory and application of cryptology and information security. pp. 452- 473 ,(2003) , 10.1007/978-3-540-40061-5_29
Mihir Bellare, Kenneth G. Paterson, Susan Thomson, RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures Advances in Cryptology – ASIACRYPT 2012. pp. 331- 348 ,(2012) , 10.1007/978-3-642-34961-4_21