Making Any Identity-Based Encryption Accountable, Efficiently

Aggelos Kiayias, Qiang Tang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Identity-Based Encryption (IBE) provides a compelling solution to the PKI management problem, however it comes with the serious privacy consideration that a trusted party (called the PKG) is required to generate (and hence also know) the secret keys of all users. This inherent key escrow problem is considered to be one of the major reasons hindering the wider utilization of IBE systems. In order to address this problem, Goyal [20] introduced the notion of accountable authority IBE (A-IBE), in which a judge can differentiate the PKG from the user as the source of a decryption software. Via this “tracing” mechanism, A-IBE deters the PKG from leaking the user’s secret key and hence offers a defense mechanism for IBE users against a malicious PKG.

All previous works on A-IBE focused on specialized constructions trying to achieve different properties and efficiency enhancements. In this paper for the first time we show how to add accountability to any IBE scheme using oblivious transfer (OT), with almost the same ciphertext efficiency as the underlying IBE. Furthermore, we extend our generic construction to support identity reuse without losing efficiency. This property is desirable in practice as users may accidentally lose their secret keys and they -naturally- prefer not to abandon their identities. How to achieve this property was open until our work. Along the way, we first modify the generic construction and develop a new technique to provide public traceability generically.
Original languageEnglish
Title of host publicationComputer Security -- ESORICS 2015
Subtitle of host publication20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I
EditorsGünther Pernul, Peter Y A Ryan, Edgar Weippl
Place of PublicationCham
PublisherSpringer
Pages326-346
Number of pages21
ISBN (Electronic)978-3-319-24174-6
ISBN (Print)978-3-319-24173-9
DOIs
Publication statusPublished - Jan 2016
Event20th European Symposium on Research in Computer Security - Vienna, Austria
Duration: 21 Sept 201525 Sept 2015
http://esorics2015.sba-research.org/

Publication series

NameLecture Notes in Computer Science (LNCS)
PublisherSpringer International Publishing
Volume9326
ISSN (Print)0302-9743

Conference

Conference20th European Symposium on Research in Computer Security
Abbreviated titleESORICS 2015
Country/TerritoryAustria
CityVienna
Period21/09/1525/09/15
Internet address

Fingerprint

Dive into the research topics of 'Making Any Identity-Based Encryption Accountable, Efficiently'. Together they form a unique fingerprint.

Cite this