Escrow-free encryption supporting cryptographic workflow

  • Authors:
  • S. S. Al-Riyami;J. Malone-Lee;N. P. Smart

  • Affiliations:
  • Center of Excellence, E-Government, PC 112, Muscat, Sultanate of Oman;Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, BS8 1UB, Bristol, United Kingdom;Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, BS8 1UB, Bristol, United Kingdom

  • Venue:
  • International Journal of Information Security
  • Year:
  • 2006

Quantified Score

Hi-index 0.01

Visualization

Abstract

Since Boneh and Franklin published their seminal paper on identity based encryption (IBE) using the Weil pairing, there has been a great deal of interest in cryptographic primitives based on elliptic-curve pairings. One particularly interesting application has been to control access to data, via possibly complex policies. In this paper we continue the research in this vein. We present an encryption scheme such that the receiver of an encrypted message can only decrypt if it satisfies a particular policy chosen by the sender at the time of encryption. Unlike standard IBE, our encryption scheme is escrow free in that no credential-issuing authority (or colluding set of credential-issuing authorities) is able to decrypt ciphertexts itself, providing the users' public keys are properly certified. In addition we describe a security model for the scenario in question and provide proofs of security for our scheme (in the random oracle model).