Browse > Article
http://dx.doi.org/10.13089/JKIISC.2017.27.6.1281

Accountable Authority Revocable Identity-Based Encryption  

Choi, Suri (Graduate School of Information Security, Korea University)
Lee, Dong Hoon (Graduate School of Information Security, Korea University)
Abstract
In 2001, Boneh and Franklin proposed Identity-Based Encryption(IBE) that does not require a certificate like Public Key Infrastructure(PKI) by using user's Identity as a public key. However, IBE has a key escrow problem because the Private Key Generator(PKG), who is a trusted authority, generates a secret key of every user. Also, it does not support efficient revocation when the user's secret key is exposed or the system needs to revoke the user. Therefore, in order to use IBE as PKI that currently used, it is necessary to solve the key escrow problem and the revocation problem. In this paper, to solve those two problems, we suggest Accountable Authority Revocable IBE(A-RIBE) based on Accountable Authority IBE that mitigates the key escrow problem and Revocable IBE that solves the revocation problem. Also, we define the security model suitable foe A-RIBE, and analyze the principle of designing A-RIBE according to based A-IBE and RIBE and their advantage and disadvantage.
Keywords
Identity-Based Encryption; Revocable IBE; Accountable Authority IBE; PKI;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Boldyreva, V. Goyal and V. Kumar, "Identity-based encryption with efficient revocation", Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 417-426, Oct. 2008.
2 D. Boneh and X. Boyen, "Efficient selective-id identity based encryption without random oracles", Advances in Cryptology, EUROCRYPT'04, LNCS 3027, pp. 223-238, 2004.
3 D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," Advances in Cryptology, CRYPTO'01, LNCS 2139, pp. 213-229, 2001.
4 C. Gentry, "Practical identity-based encryption without random oracles," Advances in Cryptology, EUROCRYPT'06, LNCS 4004, pp. 445-464, 2006.
5 O. Goldreich, The Foundations of Cryptography, Basic Techniques, vol. 1, Cambridge University Press, 2001.
6 V. Goyal, "Reducing trust in the PKG in identity based cryptosystems," Advances in Cryptology, CRYPTO'07, LNCS 4622, pp. 430-447, 2007.
7 V. Goyal, S. Lu, A. Sahai and B. Waters, "Black-box accountable authority identity-based encryption," Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 427-436, Oct. 2008.
8 J. Groth and A. Sahai, "Efficient Non-interactive Proof Systems for Bilinear Groups", Advances in Cryptology, EUROCRYPT'08, LNCS 4965, pp. 415-432, 2008.
9 A. Kiayias and G. Tang, "Making Any Identity-Based Encryption Accountable, Efficiently," European Symposium on Research in Computer Security, pp. 326-346, Sep. 2015.
10 J. Lai, R.H. Deng, Y. Zhao and J. Weng, "Accountable authority identitybased encryption with public traceability," Topics in Cryptology-CT-RSA'13, LNCS 7779, pp. 326-342, 2013.
11 B. Libert and D. Vergnaud, "Towards black-box accountable authority IBE with short ciphertexts and private keys", Proc. of the PKC'09, LNCS 5443, pp. 235-255, 2009.
12 B. Libert and D. Vergnaud, "Adaptive-id secure revocable identitybased encryption", Topics in Cryptology-CT-RSA'09, LNCS 5473, pp. 1-15, 2009.
13 C.P. Schnorr, "Efficient Identification and Signatures for Smart Cards", Advances in Cryptology, CRYPTO'89, LNCS 435, pp. 239-252, 1990.
14 D. Naor, M. Naor and J. Lotspiech, "Revocation and tracing schemes for stateless receivers", Advances in Cryptology, CRYPTO'01, LNCS 2139, pp. 41-62, 2001.
15 M. Naor and B. Pinkas, "Efficient oblivious transfer protocols", Proceedings of the 12th annual ACM-SIAM symposium on Discrete algorithms. Society for Industrial and Applied Mathematics, pp. 448-457, Jan. 2001.
16 A. Sahai and B. Waters, "Fuzzy identity based encryption", Advances in Cryptology, EUROCRYPT'05, LNCS 3494, pp. 457-473, 2005.
17 J.H. Seo and K. Emura, "Revocable identity-based encryption revisited: Security model and construction", Proc. of the PKC'13, LNCS 7778, pp. 216-234, 2013.
18 A. Shamir, "Identity-based cryptosystems and signature schemes", Advances in Cryptology, CRYPTO'84, LNCS 196, pp. 47-53, 1985.
19 B. Waters, "Efficient identity-based encryption without random oracles", Advances in Cryptology, EUROCRYPT'05, LNCS 3494, pp. 114-127, 2005.