Identity-Based Decryption
نویسنده
چکیده
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob the resulting ciphertext, which Bob can send to the trusted authority. The trusted authority provides Bob the symmetric key only upon verifying Bob’s identity. 1 Identity-Based Encryption Shamir introduced [7] the notion of identity-based encryption (IBE). In contrast to public-key encryption (PKE), a user of IBE does not have a distinct public key. Rather, the user’s identity serves the role of public key. The user’s private key is created by some trusted authority. Boneh and Franklin proposed a practical identity-based encryption scheme [3, 4]. Some of the advantages of identity-based encryption over public-key encryption are: Less initialization: Alice can encrypt messages to Bob even if Bob does not yet have a private key. So, unlike in PKE, Bob does not have to be initialized into the system, that is, he does not already need to have a public key. This is because, upon receipt of such an IBE ciphertext from Alice, Bob can, if he does not already have the private key needed for decryption, obtain his private key from the trusted authority. Also, with a conventional PKE, Bob has only a future, not an immediate, incentive to set up a public key, but in IBE, Bob’s incentive is immediate: to be able read Alice’s ciphertext. Less intercommunication: Bob’s public key does not need to be communicated to Alice. Consequently there is less intercommunication: Bob does not need to send his public key to Alice nor does Alice need to look up Bob’s public key in a directory, whereas in PKE, Alice would typically obtain Bob’s public key by one of these two methods. More customizability: Alice can select and add auxiliary information to Bob’s identity in IBE, such as a date allowed for decryption, or some other condition that Bob must satisfy in order to obtain his private key from the authority. Potentially Less Computational Overhead in Encryption: When, as is often the case, PKE relies on a public-key infrastructure (PKI) to authenticate public keys, it will be the case that Alice can only be sure that a public key actually belongs to Bob by verifying a certificate. ∗Certicom Research
منابع مشابه
Identity-Based Threshold Decryption
In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identity-based threshold decryption scheme in which a private key associated with an identity is shared. A major contribution of this paper is to construct the first identity-based threshold decryption scheme secure against chosen-ci...
متن کاملIdentity-Based Server-Aided Decryption
Identity-Based Cryptosystem plays an important role in the modern cryptography world, due to the elimination of the costly certificate. However, all practical identity-based encryption schemes require pairing operation in the decryption stage. Pairing is a heavy mathematical algorithm, especially for resource-constrained devices such as smart cards or wireless sensors. In other words, decryptio...
متن کاملParameter Based Access Control Model for Mobile Handsets
The concept of mobile services is to provide the access to online content and services from anywhere, anytime and on any device. The mobile user is the consumer for the mobile services and the access to the services are enabled according to the user identification. Meanwhile, mobile device identity, SIM identity and location identity are some of the other identification parameters can be used b...
متن کاملIdentity-based Hierarchical Designated Decryption
This paper presents an identity-based hierarchical designated decryption (IHDD) scheme which allows a message sender to generate ciphertexts that can be decrypted by (1) only a specified recipient or (2) a specified recipient and all or some of its ancestor users in the hierarchy tree. The newly proposed scheme can be considered as a combination of the hierarchical identity-based encryption (HI...
متن کاملMultiple and Unlinkable Public Key Encryption without Certificates
We newly propose a multiple and unlinkable identity-based public key encryption scheme. Unlike the traditional public key encryption and identity-based encryption schemes, our scheme allows the use of a various number of identity-based public keys in different groups or applications while keeping a single decryption key so that the decryption key can decrypt every ciphertexts encrypted with tho...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2011 شماره
صفحات -
تاریخ انتشار 2011