Traceable and retrievable identity-based encryption

Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

35 Citations (Scopus)

Abstract

Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. This concept enables some mechanisms to reduce the trust of a private key generator (PKG) in an IBE system. The aim of this paper is threefold. First, we discuss some subtleties in the first traceable IBE scheme in the Crypto 2007 paper. Second, we present an extension to this work by having the PKG's master secret key retrieved automatically if more than one user secret key are released. This way, the user can produce a concrete proof of misbehaviour of the PKG in the court. In contrast to previous approach, our idea gives strong incentive for the PKG to strengthen the security of the system since if someone can successfully release a user's secret key, it means that his security is also compromised. We present a formal model to capture our idea. Third, we present an efficient construction based on Gentry's IBE that satisfies our model and prove its security. Our construction is proven secure in the random oracle model. Nevertheless, we should emphasize that the aim of this paper is to introduce the new model to strengthen the IBE system.

Original languageEnglish
Title of host publicationApplied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings
Pages94-110
Number of pages17
DOIs
Publication statusPublished - 30 Jun 2008
Externally publishedYes
Event6th International Conference on Applied Cryptography and Network Security, ACNS 2008 - New York, NY, United States of America
Duration: 3 Jun 20086 Jun 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5037 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Conference on Applied Cryptography and Network Security, ACNS 2008
CountryUnited States of America
CityNew York, NY
Period3/06/086/06/08

Keywords

  • Identity-based Encryption
  • PKG
  • Retrievability
  • Traceability
  • Trust

Cite this

Au, M. H., Huang, Q., Liu, J. K., Susilo, W., Wong, D. S., & Yang, G. (2008). Traceable and retrievable identity-based encryption. In Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings (pp. 94-110). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5037 LNCS). https://doi.org/10.1007/978-3-540-68914-0_6
Au, Man Ho ; Huang, Qiong ; Liu, Joseph K. ; Susilo, Willy ; Wong, Duncan S. ; Yang, Guomin. / Traceable and retrievable identity-based encryption. Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. 2008. pp. 94-110 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{c8ddb669f24a4a4fa9770c2e0a7f124c,
title = "Traceable and retrievable identity-based encryption",
abstract = "Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. This concept enables some mechanisms to reduce the trust of a private key generator (PKG) in an IBE system. The aim of this paper is threefold. First, we discuss some subtleties in the first traceable IBE scheme in the Crypto 2007 paper. Second, we present an extension to this work by having the PKG's master secret key retrieved automatically if more than one user secret key are released. This way, the user can produce a concrete proof of misbehaviour of the PKG in the court. In contrast to previous approach, our idea gives strong incentive for the PKG to strengthen the security of the system since if someone can successfully release a user's secret key, it means that his security is also compromised. We present a formal model to capture our idea. Third, we present an efficient construction based on Gentry's IBE that satisfies our model and prove its security. Our construction is proven secure in the random oracle model. Nevertheless, we should emphasize that the aim of this paper is to introduce the new model to strengthen the IBE system.",
keywords = "Identity-based Encryption, PKG, Retrievability, Traceability, Trust",
author = "Au, {Man Ho} and Qiong Huang and Liu, {Joseph K.} and Willy Susilo and Wong, {Duncan S.} and Guomin Yang",
year = "2008",
month = "6",
day = "30",
doi = "10.1007/978-3-540-68914-0_6",
language = "English",
isbn = "3540689133",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "94--110",
booktitle = "Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings",

}

Au, MH, Huang, Q, Liu, JK, Susilo, W, Wong, DS & Yang, G 2008, Traceable and retrievable identity-based encryption. in Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5037 LNCS, pp. 94-110, 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, New York, NY, United States of America, 3/06/08. https://doi.org/10.1007/978-3-540-68914-0_6

Traceable and retrievable identity-based encryption. / Au, Man Ho; Huang, Qiong; Liu, Joseph K.; Susilo, Willy; Wong, Duncan S.; Yang, Guomin.

Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. 2008. p. 94-110 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5037 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

TY - GEN

T1 - Traceable and retrievable identity-based encryption

AU - Au, Man Ho

AU - Huang, Qiong

AU - Liu, Joseph K.

AU - Susilo, Willy

AU - Wong, Duncan S.

AU - Yang, Guomin

PY - 2008/6/30

Y1 - 2008/6/30

N2 - Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. This concept enables some mechanisms to reduce the trust of a private key generator (PKG) in an IBE system. The aim of this paper is threefold. First, we discuss some subtleties in the first traceable IBE scheme in the Crypto 2007 paper. Second, we present an extension to this work by having the PKG's master secret key retrieved automatically if more than one user secret key are released. This way, the user can produce a concrete proof of misbehaviour of the PKG in the court. In contrast to previous approach, our idea gives strong incentive for the PKG to strengthen the security of the system since if someone can successfully release a user's secret key, it means that his security is also compromised. We present a formal model to capture our idea. Third, we present an efficient construction based on Gentry's IBE that satisfies our model and prove its security. Our construction is proven secure in the random oracle model. Nevertheless, we should emphasize that the aim of this paper is to introduce the new model to strengthen the IBE system.

AB - Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. This concept enables some mechanisms to reduce the trust of a private key generator (PKG) in an IBE system. The aim of this paper is threefold. First, we discuss some subtleties in the first traceable IBE scheme in the Crypto 2007 paper. Second, we present an extension to this work by having the PKG's master secret key retrieved automatically if more than one user secret key are released. This way, the user can produce a concrete proof of misbehaviour of the PKG in the court. In contrast to previous approach, our idea gives strong incentive for the PKG to strengthen the security of the system since if someone can successfully release a user's secret key, it means that his security is also compromised. We present a formal model to capture our idea. Third, we present an efficient construction based on Gentry's IBE that satisfies our model and prove its security. Our construction is proven secure in the random oracle model. Nevertheless, we should emphasize that the aim of this paper is to introduce the new model to strengthen the IBE system.

KW - Identity-based Encryption

KW - PKG

KW - Retrievability

KW - Traceability

KW - Trust

UR - http://www.scopus.com/inward/record.url?scp=45749146255&partnerID=8YFLogxK

U2 - 10.1007/978-3-540-68914-0_6

DO - 10.1007/978-3-540-68914-0_6

M3 - Conference Paper

SN - 3540689133

SN - 9783540689133

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 94

EP - 110

BT - Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings

ER -

Au MH, Huang Q, Liu JK, Susilo W, Wong DS, Yang G. Traceable and retrievable identity-based encryption. In Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. 2008. p. 94-110. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-540-68914-0_6