Abstract
Identity-Based Encryption (IBE) provides a compelling solution to the PKI management problem, however it comes with the serious privacy consideration that a trusted party (called the PKG) is required to generate (and hence also know) the secret keys of all users. This inherent key escrow problem is considered to be one of the major reasons hindering the wider utilization of IBE systems. In order to address this problem, Goyal [20] introduced the notion of accountable authority IBE (A-IBE), in which a judge can differentiate the PKG from the user as the source of a decryption software. Via this “tracing” mechanism, A-IBE deters the PKG from leaking the user’s secret key and hence offers a defense mechanism for IBE users against a malicious PKG.
All previous works on A-IBE focused on specialized constructions trying to achieve different properties and efficiency enhancements. In this paper for the first time we show how to add accountability to any IBE scheme using oblivious transfer (OT), with almost the same ciphertext efficiency as the underlying IBE. Furthermore, we extend our generic construction to support identity reuse without losing efficiency. This property is desirable in practice as users may accidentally lose their secret keys and they -naturally- prefer not to abandon their identities. How to achieve this property was open until our work. Along the way, we first modify the generic construction and develop a new technique to provide public traceability generically.
All previous works on A-IBE focused on specialized constructions trying to achieve different properties and efficiency enhancements. In this paper for the first time we show how to add accountability to any IBE scheme using oblivious transfer (OT), with almost the same ciphertext efficiency as the underlying IBE. Furthermore, we extend our generic construction to support identity reuse without losing efficiency. This property is desirable in practice as users may accidentally lose their secret keys and they -naturally- prefer not to abandon their identities. How to achieve this property was open until our work. Along the way, we first modify the generic construction and develop a new technique to provide public traceability generically.
Original language | English |
---|---|
Title of host publication | Computer Security -- ESORICS 2015 |
Subtitle of host publication | 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I |
Editors | Günther Pernul, Peter Y A Ryan, Edgar Weippl |
Place of Publication | Cham |
Publisher | Springer |
Pages | 326-346 |
Number of pages | 21 |
ISBN (Electronic) | 978-3-319-24174-6 |
ISBN (Print) | 978-3-319-24173-9 |
DOIs | |
Publication status | Published - Jan 2016 |
Event | 20th European Symposium on Research in Computer Security - Vienna, Austria Duration: 21 Sept 2015 → 25 Sept 2015 http://esorics2015.sba-research.org/ |
Publication series
Name | Lecture Notes in Computer Science (LNCS) |
---|---|
Publisher | Springer International Publishing |
Volume | 9326 |
ISSN (Print) | 0302-9743 |
Conference
Conference | 20th European Symposium on Research in Computer Security |
---|---|
Abbreviated title | ESORICS 2015 |
Country/Territory | Austria |
City | Vienna |
Period | 21/09/15 → 25/09/15 |
Internet address |