中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
accountable authority identity-based encryption with public traceability

文献类型:会议论文

作者Lai Junzuo ; Deng Robert H. ; Zhao Yunlei ; Weng Jian
出版日期2013
会议名称Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
会议日期February 25, 2013 - March 1, 2013
会议地点San Francisco, CA, United states
关键词Algorithms Concrete construction
页码326-342
中文摘要At Crypto'07, Goyal introduced the notion of accountable authority identity-based encryption (A-IBE) in order to mitigate the inherent key escrow problem in identity-based encryption, and proposed two concrete constructions. In an A-IBE system, if the private key generator (PKG) distributes a decryption key or produces an unauthorized decryption box for a user maliciously, it runs the risk of being caught and sued in the court of law with the help of a tracing algorithm. Subsequent efforts focused on constructions of A-IBE schemes with enhanced security. In these A-IBE constructions, the tracing algorithm needs to take a user's decryption key as input. If the user lost his key or is deliberately uncooperative in court, then we cannot implicate the PKG or the user. An interesting open problem left by Goyal et al. at CCS'08 is to consider the possibility of tracing a decryption box using only a public tracing key, or with the assistance of a tracing authority. In this paper, we address this problem positively. We first extend the original model of A-IBE to accommodate public traceability, and then propose an A-IBE scheme in the new model. To the best of our knowledge, the proposed scheme is the first A-IBE with public traceability. © 2013 Springer-Verlag.
英文摘要At Crypto'07, Goyal introduced the notion of accountable authority identity-based encryption (A-IBE) in order to mitigate the inherent key escrow problem in identity-based encryption, and proposed two concrete constructions. In an A-IBE system, if the private key generator (PKG) distributes a decryption key or produces an unauthorized decryption box for a user maliciously, it runs the risk of being caught and sued in the court of law with the help of a tracing algorithm. Subsequent efforts focused on constructions of A-IBE schemes with enhanced security. In these A-IBE constructions, the tracing algorithm needs to take a user's decryption key as input. If the user lost his key or is deliberately uncooperative in court, then we cannot implicate the PKG or the user. An interesting open problem left by Goyal et al. at CCS'08 is to consider the possibility of tracing a decryption box using only a public tracing key, or with the assistance of a tracing authority. In this paper, we address this problem positively. We first extend the original model of A-IBE to accommodate public traceability, and then propose an A-IBE scheme in the new model. To the best of our knowledge, the proposed scheme is the first A-IBE with public traceability. © 2013 Springer-Verlag.
收录类别EI
会议录Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
语种英语
ISSN号0302-9743
ISBN号9783642360947
源URL[http://ir.iscas.ac.cn/handle/311060/15907]  
专题软件研究所_软件所图书馆_会议论文
推荐引用方式
GB/T 7714
Lai Junzuo,Deng Robert H.,Zhao Yunlei,et al. accountable authority identity-based encryption with public traceability[C]. 见:Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013. San Francisco, CA, United states. February 25, 2013 - March 1, 2013.

入库方式: OAI收割

来源:软件研究所

浏览0
下载0
收藏0
其他版本

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。