Verifiable Registration-Based Encryption

被引:16
|
作者
Goyal, Rishab [1 ]
Vusirikala, Satyanarayana [2 ]
机构
[1] MIT, Cambridge, MA 02139 USA
[2] UT Austin, Austin, TX 78712 USA
来源
关键词
D O I
10.1007/978-3-030-56784-2_21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent work, Garg, Hajiabadi, Mahmoody, and Rahimi [18] introduced a new encryption framework, which they referred to as Registration-Based Encryption (RBE). The central motivation behind RBE was to provide a novel methodology for solving the well-known key-escrow problem in Identity-Based Encryption (IBE) systems [33]. Informally, in an RBE system, there is no private-key generator unlike IBE systems, but instead, it is replaced with a public key accumulator. Every user in an RBE system samples its own public-secret key pair and sends the public key to the accumulator for registration. The key accumulator has no secret state and is only responsible for compressing all the registered user identity-key pairs into a short public commitment. Here the encryptor only requires the compressed parameters along with the target identity, whereas a decryptor requires supplementary key material along with the secret key associated with the registered public key. The initial construction in [18] based on standard assumptions only provided weak efficiency properties. In a follow-up work by Garg, Hajiabadi, Mahmoody, Rahimi, and Sekar [19], they gave an efficient RBE construction from standard assumptions. However, both these works considered the key accumulator to be honest which might be too strong an assumption in real-world scenarios. In this work, we initiate a formal study of RBE systems with malicious key accumulators. To that end, we introduce a strengthening of the RBE framework which we call Verifiable RBE (VRBE). A VRBE system additionally gives the users an extra capability to obtain short proofs from the key accumulator proving correct (and unique) registration for every registered user as well as proving non-registration for any yet unregistered identity. We construct VRBE systems that provide succinct proofs of registration and non-registration from standard assumptions (such as CDH, Factoring, LWE). Our proof systems also naturally allow a much more efficient audit process which can be performed by any non-participating third party as well. A by-product of our approach is that we provide a more efficient RBE construction than that provided in the prior work of Garg et al. [19]. And lastly, we initiate a study on the extension of VRBE to a wider range of access and trust structures.
引用
收藏
页码:621 / 651
页数:31
相关论文
共 50 条
  • [1] Efficient Registration-Based Encryption
    Glaeser, Noemi
    Kolonelos, Dimitris
    Malavolta, Giulio
    Rahimi, Ahmadreza
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1065 - 1079
  • [2] Lower Bounds on Assumptions Behind Registration-Based Encryption
    Hajiabadi, Mohammad
    Mahmoody, Mohammad
    Qi, Wei
    Sarfaraz, Sara
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT II, 2023, 14370 : 306 - 334
  • [3] Lower Bounds for the Number of Decryption Updates in Registration-Based Encryption
    Mahmoody, Mohammad
    Qi, Wei
    Rahimi, Ahmadreza
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT I, 2022, 13747 : 559 - 587
  • [4] Registration-Based Encryption: Removing Private-Key Generator from IBE
    Garg, Sanjam
    Hajiabadi, Mohammad
    Mahmoody, Mohammad
    Rahimi, Ahmadreza
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT I, 2018, 11239 : 689 - 718
  • [5] Registration-based interpolation
    Penney, GP
    Schnabel, JA
    Rueckert, D
    Viergever, MA
    Niessen, WJ
    IEEE TRANSACTIONS ON MEDICAL IMAGING, 2004, 23 (07) : 922 - 926
  • [6] Registration-Based Language Abstractions
    Davis, Samuel
    Kiczales, Gregor
    ACM SIGPLAN NOTICES, 2010, 45 (10) : 754 - 773
  • [7] Verifiable attribute based encryption
    Tang, Qiang
    Ji, Dongyao
    International Journal of Network Security, 2010, 10 (02) : 114 - 120
  • [8] Cuckoo Commitments: Registration-Based Encryption and Key-Value Map Commitments for Large Spaces
    Fiore, Dario
    Kolonelos, Dimitris
    de Perthuis, Paola
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT V, 2023, 14442 : 166 - 200
  • [9] Motion Compensation by Registration-Based Catheter Tracking
    Brost, Alexander
    Wimmer, Andreas
    Liao, Rui
    Hornegger, Joachim
    Strobel, Norbert
    MEDICAL IMAGING 2011: VISUALIZATION, IMAGE-GUIDED PROCEDURES, AND MODELING, 2011, 7964
  • [10] Registration-based interpolation applied to cardiac MRI
    Olafsdottir, Hildur
    Pedersen, Henrik
    Hansen, Michael Sass
    Lyksborg, Mark
    Hansen, Mads Fogtmann
    Darkner, Sune
    Larsen, Rasmus
    MEDICAL IMAGING 2010: IMAGE PROCESSING, 2010, 7623