File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Traceable and retrievable identity-based encryption

TitleTraceable and retrievable identity-based encryption
Authors
KeywordsTraceability
Retrievability
PKG
Trust
Identity-based Encryption
Issue Date2008
Citation
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2008, v. 5037 LNCS, p. 94-110 How to Cite?
AbstractVery recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. This concept enables some mechanisms to reduce the trust of a private key generator (PKG) in an IBE system. The aim of this paper is threefold. First, we discuss some subtleties in the first traceable IBE scheme in the Crypto 2007 paper. Second, we present an extension to this work by having the PKG's master secret key retrieved automatically if more than one user secret key are released. This way, the user can produce a concrete proof of misbehaviour of the PKG in the court. In contrast to previous approach, our idea gives strong incentive for the PKG to strengthen the security of the system since if someone can successfully release a user's secret key, it means that his security is also compromised. We present a formal model to capture our idea. Third, we present an efficient construction based on Gentry's IBE that satisfies our model and prove its security. Our construction is proven secure in the random oracle model. Nevertheless, we should emphasize that the aim of this paper is to introduce the new model to strengthen the IBE system. © 2008 Springer-Verlag Berlin Heidelberg.
Persistent Identifierhttp://hdl.handle.net/10722/280530
ISSN
2023 SCImago Journal Rankings: 0.606

 

DC FieldValueLanguage
dc.contributor.authorAu, Man Ho-
dc.contributor.authorHuang, Qiong-
dc.contributor.authorLiu, Joseph K.-
dc.contributor.authorSusilo, Willy-
dc.contributor.authorWong, Duncan S.-
dc.contributor.authorYang, Guomin-
dc.date.accessioned2020-02-17T14:34:16Z-
dc.date.available2020-02-17T14:34:16Z-
dc.date.issued2008-
dc.identifier.citationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2008, v. 5037 LNCS, p. 94-110-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10722/280530-
dc.description.abstractVery recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. This concept enables some mechanisms to reduce the trust of a private key generator (PKG) in an IBE system. The aim of this paper is threefold. First, we discuss some subtleties in the first traceable IBE scheme in the Crypto 2007 paper. Second, we present an extension to this work by having the PKG's master secret key retrieved automatically if more than one user secret key are released. This way, the user can produce a concrete proof of misbehaviour of the PKG in the court. In contrast to previous approach, our idea gives strong incentive for the PKG to strengthen the security of the system since if someone can successfully release a user's secret key, it means that his security is also compromised. We present a formal model to capture our idea. Third, we present an efficient construction based on Gentry's IBE that satisfies our model and prove its security. Our construction is proven secure in the random oracle model. Nevertheless, we should emphasize that the aim of this paper is to introduce the new model to strengthen the IBE system. © 2008 Springer-Verlag Berlin Heidelberg.-
dc.languageeng-
dc.relation.ispartofLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)-
dc.subjectTraceability-
dc.subjectRetrievability-
dc.subjectPKG-
dc.subjectTrust-
dc.subjectIdentity-based Encryption-
dc.titleTraceable and retrievable identity-based encryption-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1007/978-3-540-68914-0_6-
dc.identifier.scopuseid_2-s2.0-45749146255-
dc.identifier.volume5037 LNCS-
dc.identifier.spage94-
dc.identifier.epage110-
dc.identifier.eissn1611-3349-
dc.identifier.issnl0302-9743-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats