On use of identity-based encryption for secure emailing

被引:0
|
作者
Veigner, Christian [1 ]
Rong, Chunming [1 ]
机构
[1] Univ Stavanger, N-4036 Stavanger, Norway
关键词
identity-based encryption (IBE); public-key infrastructure (PKI); spam; viruses; denial of service attacks;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In 1984 Adi Shamir requested a solution for a novel public-key encryption scheme, called identity-based encryption. The original motivation for identity-based encryption was to help the deployment of a public-key infrastructure. The idea of an identity-based encryption scheme is that the public key can be any arbitrary string, for example, an email address, a name or a role. Several solutions were proposed in the following years. In 2001 the first practical and efficient scheme was proposed by Boneh and Franklin. Their encryption scheme was based on the Weil pairing on elliptic curves and proved secure in the random oracle model. In 2005, a new promising suggestion due to Waters was proposed, this time as an efficient solution without random oracles. An identity-based encryption (IBE) scheme does not need to download certificates to authenticate public keys as in a public-key infrastructure (PKI). A public key in an identity-based cryptosystem is simply the receiver's identity, e.g. an email address. As often, when new technology occurs, the focus is on the functionality of the technology and not on its security. In this paper we briefly review about identity-based encryption and decryption, particularly, the Boneh-Franklin algorithms. Later on we show that IBE schemes used for secure emailing render spamming far easier for spammers compared to if a PKI certificate approach is used. With the IBE approach, viruses may also be spread out more efficiently.
引用
收藏
页码:289 / +
页数:2
相关论文
共 50 条
  • [21] An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Xia, Xiaonan
    Zheng, Kangjia
    [J]. PLOS ONE, 2014, 9 (09):
  • [22] Adaptively Secure Hierarchical Identity-Based Encryption over Lattice
    Zhang, Leyou
    Wu, Qing
    [J]. NETWORK AND SYSTEM SECURITY, 2017, 10394 : 46 - 58
  • [23] Fully Secure Accountable-Authority Identity-Based Encryption
    Sahai, Amit
    Seyalioglu, Hakan
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 296 - 316
  • [24] Adaptive-ID Secure Revocable Identity-Based Encryption
    Libert, Benoit
    Vergnaud, Damien
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 1 - +
  • [25] Secure identity-based encryption in the quantum random oracle model
    Zhandry, Mark
    [J]. INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2015, 13 (04)
  • [26] Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
    Shao, Jun
    Cao, Zhenfu
    [J]. INFORMATION SCIENCES, 2012, 206 : 83 - 95
  • [27] Provably Secure Identity-Based Encryption and Signature over Cyclotomic Fields
    Wang, Yang
    Wang, Mingqiang
    Zou, Jingdan
    Xu, Jin
    Wang, Jing
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [28] A CHOSEN-CIPHERTEXT SECURE IDENTITY-BASED BROADCAST ENCRYPTION SCHEME
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 3556 - +
  • [29] Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model
    孙瑾
    胡予濮
    张乐友
    [J]. Journal of Shanghai Jiaotong University(Science), 2011, 16 (06) : 672 - 676
  • [30] Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
    Han, Shuai
    Liu, Shengli
    Qin, Baodong
    Gu, Dawu
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (03) : 517 - 554