Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A course in number theory and cryptography
A course in number theory and cryptography
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
Mathematics of Computation
An Identity Based Encryption system
Proceedings of the 3rd international symposium on Principles and practice of programming in Java
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
International Journal of Security and Networks
An identity-based key infrastructure suitable for messaging and its application to e-mail
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
An interpretation of identity-based cryptography
Foundations of security analysis and design IV
Secure cryptographic workflow in the standard model
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
How to solve key escrow and identity revocation in identity-based encryption schemes
ICISS'05 Proceedings of the First international conference on Information Systems Security
An identity-based key infrastructure suitable for messaging and its application to e-mail
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Hi-index | 0.00 |
Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. However, recent studies also reveal that the infrastructure needed for IBE systems may be as complicated as the conventional public key cryptosytems and not sufficient research has been conducted in relevant issues concerning the infrastructure. In this paper, we intended to propose an IBE infrastructure for messaging applications. The proposed infrastructure requires one registration authority and at least one public key generator and they secret share the master secret key. In addition, the PKG also shares the same master secret with each user in the system in a different way. Therefore, the PKG will never be able to learn the private keys of users under non-collusion assumption. Users can also select meaningful pseudonyms and communicate anonymously using them with other users in the system. We discuss different aspects of the proposed infrastructure such as security, key revocation, uniqueness of the identities, and non-repudiation that constitute the main drawbacks of other IBE schemes. We demonstrate that our infrastructure solves many of these drawbacks under certain assumptions. We also provide some implementation results to show the feasibility of the proposed infrastructure.