Identity-Based Decryption

نویسنده

  • Daniel R. L. Brown
چکیده

Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob the resulting ciphertext, which Bob can send to the trusted authority. The trusted authority provides Bob the symmetric key only upon verifying Bob’s identity. 1 Identity-Based Encryption Shamir introduced [7] the notion of identity-based encryption (IBE). In contrast to public-key encryption (PKE), a user of IBE does not have a distinct public key. Rather, the user’s identity serves the role of public key. The user’s private key is created by some trusted authority. Boneh and Franklin proposed a practical identity-based encryption scheme [3, 4]. Some of the advantages of identity-based encryption over public-key encryption are: Less initialization: Alice can encrypt messages to Bob even if Bob does not yet have a private key. So, unlike in PKE, Bob does not have to be initialized into the system, that is, he does not already need to have a public key. This is because, upon receipt of such an IBE ciphertext from Alice, Bob can, if he does not already have the private key needed for decryption, obtain his private key from the trusted authority. Also, with a conventional PKE, Bob has only a future, not an immediate, incentive to set up a public key, but in IBE, Bob’s incentive is immediate: to be able read Alice’s ciphertext. Less intercommunication: Bob’s public key does not need to be communicated to Alice. Consequently there is less intercommunication: Bob does not need to send his public key to Alice nor does Alice need to look up Bob’s public key in a directory, whereas in PKE, Alice would typically obtain Bob’s public key by one of these two methods. More customizability: Alice can select and add auxiliary information to Bob’s identity in IBE, such as a date allowed for decryption, or some other condition that Bob must satisfy in order to obtain his private key from the authority. Potentially Less Computational Overhead in Encryption: When, as is often the case, PKE relies on a public-key infrastructure (PKI) to authenticate public keys, it will be the case that Alice can only be sure that a public key actually belongs to Bob by verifying a certificate. ∗Certicom Research

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identity-Based Threshold Decryption

In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identity-based threshold decryption scheme in which a private key associated with an identity is shared. A major contribution of this paper is to construct the first identity-based threshold decryption scheme secure against chosen-ci...

متن کامل

Identity-Based Server-Aided Decryption

Identity-Based Cryptosystem plays an important role in the modern cryptography world, due to the elimination of the costly certificate. However, all practical identity-based encryption schemes require pairing operation in the decryption stage. Pairing is a heavy mathematical algorithm, especially for resource-constrained devices such as smart cards or wireless sensors. In other words, decryptio...

متن کامل

Parameter Based Access Control Model for Mobile Handsets

The concept of mobile services is to provide the access to online content and services from anywhere, anytime and on any device. The mobile user is the consumer for the mobile services and the access to the services are enabled according to the user identification. Meanwhile, mobile device identity, SIM identity and location identity are some of the other identification parameters can be used b...

متن کامل

Identity-based Hierarchical Designated Decryption

This paper presents an identity-based hierarchical designated decryption (IHDD) scheme which allows a message sender to generate ciphertexts that can be decrypted by (1) only a specified recipient or (2) a specified recipient and all or some of its ancestor users in the hierarchy tree. The newly proposed scheme can be considered as a combination of the hierarchical identity-based encryption (HI...

متن کامل

Multiple and Unlinkable Public Key Encryption without Certificates

We newly propose a multiple and unlinkable identity-based public key encryption scheme. Unlike the traditional public key encryption and identity-based encryption schemes, our scheme allows the use of a various number of identity-based public keys in different groups or applications while keeping a single decryption key so that the decryption key can decrypt every ciphertexts encrypted with tho...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2011  شماره 

صفحات  -

تاریخ انتشار 2011