Accountable identity-based encryption with distributed private key generators

被引:9
|
作者
Zhao, Zhen [1 ,2 ]
Wu, Ge [2 ]
Susilo, Willy [2 ]
Guo, Fuchun [2 ]
Wang, Baocang [1 ]
Hu, Yupu [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Shaanxi, Peoples R China
[2] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW, Australia
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Identity-based encryption; Accountability; Distributed PKGs; CERTIFICATE-BASED ENCRYPTION; SHORT SIGNATURES; SCHEME; TRUST;
D O I
10.1016/j.ins.2019.07.086
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed private key generators (PKGs) in identity-based encryption (IBE) is a viable approach to mitigate the inherent key escrow problem, where the user's private key is generated by multiple PKGs, and hence, there is no single PKG can impersonate the user. Nevertheless, these PKGs can still collude to generate a user's private key and auction it without the risk of being caught. In the traditional IBE setting, accountable IBE can identify the creator of a pirated private key between the user and the PKG. Unfortunately, the similar problem in IBE with distributed PKGs remains an open research problem. To fill this gap, we concentrate on adding accountability to IBE with distributed PKGs. Specifically, we propose the formal definition of A-IBE with distributed PKGs (A-dIBE) and the corresponding security models. Subsequently, we present a concrete construction with the corresponding security proof. This cryptographic primitive enjoys the advantages of both the IBE with distributed PKGs and A-IBE. Specifically, it distributes the power to multiple PKGs, while preserving the traceability that could give a convincing judgment to identify the suspect between the user and the PKGs. Furthermore, our construction could be easily extended to achieve IND-ID-CCA security and the revocation of the PKGs is efficient. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:352 / 366
页数:15
相关论文
共 50 条
  • [1] Distributed Private-Key Generators for Identity-Based Cryptography
    Kate, Aniket
    Goldberg, Ian
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 436 - 453
  • [2] Private Key Management in Hierarchical Identity-Based Encryption
    Liu, Zhongren
    Xu, Li
    Chen, Zhide
    Guo, Fuchun
    [J]. SITIS 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGIES & INTERNET BASED SYSTEMS, 2008, : 206 - 212
  • [3] Making Any Identity-Based Encryption Accountable, Efficiently
    Kiayias, Aggelos
    Tang, Qiang
    [J]. COMPUTER SECURITY - ESORICS 2015, PT I, 2015, 9326 : 326 - 346
  • [4] Key-Private Identity-Based Proxy Re-Encryption
    Ge, Chunpeng
    Xia, Jinyue
    Fang, Liming
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (02): : 633 - 647
  • [5] Adaptive Security in Identity-Based Authenticated Key Agreement with Multiple Private Key Generators
    Fujioka, Atsushi
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 192 - 211
  • [6] Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts
    Zhao, Zhen
    Guo, Fuchun
    Lai, Jianchang
    Susilo, Willy
    Wang, Baocang
    Hu, Yupu
    [J]. THEORETICAL COMPUTER SCIENCE, 2020, 809 : 73 - 87
  • [7] Black-Box Accountable Authority Identity-Based Encryption
    Goyal, Vipul
    Lu, Steve
    Sahai, Amit
    Waters, Brent
    [J]. CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 427 - 436
  • [8] Practical identity-based encryption in multiple private key generator (PKG) environments
    Wang, Shengbao
    Cao, Zhenfu
    Xie, Qi
    Liu, Wenhao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (01) : 43 - 50
  • [9] Fully Secure Accountable-Authority Identity-Based Encryption
    Sahai, Amit
    Seyalioglu, Hakan
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 296 - 316
  • [10] Provably secure identity-based authenticated key agreement protocols with malicious private key generators
    Guo, Hua
    Li, Zhoujun
    Mu, Yi
    Zhang, Xiyong
    [J]. INFORMATION SCIENCES, 2011, 181 (03) : 628 - 647