Identity-based server-aided decryption

Joseph K. Liu, Cheng-Kang Chu, Jianying Zhou

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Abstract

Identity-Based Cryptosystem plays an important role in the modern cryptography world, due to the elimination of the costly certificate. However, all practical identity-based encryption schemes require pairing operation in the decryption stage. Pairing is a heavy mathematical algorithm, especially for resource-constrained devices such as smart cards or wireless sensors. In other words, decryption can hardly be done in these devices if identity-based cryptosystem is employed. We solve this problem by proposing a new notion called Identity-Based Server-Aided Decryption. It is similar to normal identity-based encryption scheme, but it further enables the receiver to decrypt the ciphertext without needing to compute pairing with the assistance of an external server. Secure mechanisms are provided to detect whether the server has computed correctly and prevent the server from getting any information about the plaintext or the user secret key. We give two concrete instantiations of this notion.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 16th Australasian Conference, ACISP 2011, Proceedings
PublisherSpringer
Pages337-352
Number of pages16
Volume6812 LNCS
ISBN (Print)9783642224966
DOIs
Publication statusPublished - 2011
Externally publishedYes
EventAustralasian Conference on Information Security and Privacy 2011 - Melbourne, Australia
Duration: 11 Jul 201113 Jul 2011
Conference number: 16

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6812 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Conference

ConferenceAustralasian Conference on Information Security and Privacy 2011
Abbreviated titleACISP 2011
CountryAustralia
CityMelbourne
Period11/07/1113/07/11

Cite this

Liu, J. K., Chu, C-K., & Zhou, J. (2011). Identity-based server-aided decryption. In Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Proceedings (Vol. 6812 LNCS, pp. 337-352). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6812 LNCS). Springer. https://doi.org/10.1007/978-3-642-22497-3_22
Liu, Joseph K. ; Chu, Cheng-Kang ; Zhou, Jianying. / Identity-based server-aided decryption. Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Proceedings. Vol. 6812 LNCS Springer, 2011. pp. 337-352 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{d98a371a97534af78867ffdaca64adef,
title = "Identity-based server-aided decryption",
abstract = "Identity-Based Cryptosystem plays an important role in the modern cryptography world, due to the elimination of the costly certificate. However, all practical identity-based encryption schemes require pairing operation in the decryption stage. Pairing is a heavy mathematical algorithm, especially for resource-constrained devices such as smart cards or wireless sensors. In other words, decryption can hardly be done in these devices if identity-based cryptosystem is employed. We solve this problem by proposing a new notion called Identity-Based Server-Aided Decryption. It is similar to normal identity-based encryption scheme, but it further enables the receiver to decrypt the ciphertext without needing to compute pairing with the assistance of an external server. Secure mechanisms are provided to detect whether the server has computed correctly and prevent the server from getting any information about the plaintext or the user secret key. We give two concrete instantiations of this notion.",
author = "Liu, {Joseph K.} and Cheng-Kang Chu and Jianying Zhou",
year = "2011",
doi = "10.1007/978-3-642-22497-3_22",
language = "English",
isbn = "9783642224966",
volume = "6812 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer",
pages = "337--352",
booktitle = "Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Proceedings",

}

Liu, JK, Chu, C-K & Zhou, J 2011, Identity-based server-aided decryption. in Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Proceedings. vol. 6812 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6812 LNCS, Springer, pp. 337-352, Australasian Conference on Information Security and Privacy 2011, Melbourne, Australia, 11/07/11. https://doi.org/10.1007/978-3-642-22497-3_22

Identity-based server-aided decryption. / Liu, Joseph K.; Chu, Cheng-Kang; Zhou, Jianying.

Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Proceedings. Vol. 6812 LNCS Springer, 2011. p. 337-352 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6812 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

TY - GEN

T1 - Identity-based server-aided decryption

AU - Liu, Joseph K.

AU - Chu, Cheng-Kang

AU - Zhou, Jianying

PY - 2011

Y1 - 2011

N2 - Identity-Based Cryptosystem plays an important role in the modern cryptography world, due to the elimination of the costly certificate. However, all practical identity-based encryption schemes require pairing operation in the decryption stage. Pairing is a heavy mathematical algorithm, especially for resource-constrained devices such as smart cards or wireless sensors. In other words, decryption can hardly be done in these devices if identity-based cryptosystem is employed. We solve this problem by proposing a new notion called Identity-Based Server-Aided Decryption. It is similar to normal identity-based encryption scheme, but it further enables the receiver to decrypt the ciphertext without needing to compute pairing with the assistance of an external server. Secure mechanisms are provided to detect whether the server has computed correctly and prevent the server from getting any information about the plaintext or the user secret key. We give two concrete instantiations of this notion.

AB - Identity-Based Cryptosystem plays an important role in the modern cryptography world, due to the elimination of the costly certificate. However, all practical identity-based encryption schemes require pairing operation in the decryption stage. Pairing is a heavy mathematical algorithm, especially for resource-constrained devices such as smart cards or wireless sensors. In other words, decryption can hardly be done in these devices if identity-based cryptosystem is employed. We solve this problem by proposing a new notion called Identity-Based Server-Aided Decryption. It is similar to normal identity-based encryption scheme, but it further enables the receiver to decrypt the ciphertext without needing to compute pairing with the assistance of an external server. Secure mechanisms are provided to detect whether the server has computed correctly and prevent the server from getting any information about the plaintext or the user secret key. We give two concrete instantiations of this notion.

UR - http://www.scopus.com/inward/record.url?scp=79960206839&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-22497-3_22

DO - 10.1007/978-3-642-22497-3_22

M3 - Conference Paper

SN - 9783642224966

VL - 6812 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 337

EP - 352

BT - Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Proceedings

PB - Springer

ER -

Liu JK, Chu C-K, Zhou J. Identity-based server-aided decryption. In Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Proceedings. Vol. 6812 LNCS. Springer. 2011. p. 337-352. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-22497-3_22