Registration-based Encryption Removing Private-key Generator From Ibe
- Registration-based Encryption Removing Private-key Generator From Ibe 1
- Registration-based Encryption Removing Private-key Generator From Ibe Pdf
Abstract: In this work, we introduce the notion of registration-based encryption (RBE for short) with the goal of removing the trust parties need to place in the private-key generator in an IBE scheme. In an RBE scheme, users sample their own public and secret keys. Registration-Based Encryption from Standard Assumptions Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi, and Sruthi Sekar PKC 2019; 2018. Registration-Based Encryption: Removing Private-Key Generator from IBE Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, and Ahmadreza Rahimi TCC 2018. Oct 23, 2018 Abstract: The notion of Registration-Based Encryption (RBE) was recently introduced by Garg, Hajiabadi, Mahmoody, and Rahimi TCC'18 with the goal of removing the private-key generator (PKG) from IBE. Specifically, RBE allows encrypting to identities using a (compact).
- Sep 15, 2019 Abstract. The key escrow problem is one of the main barriers to the widespread real-world use of identity-based encryption (IBE). Specifically, a key generation center (KGC), which generates secret keys for a given identity, has the power to decrypt all ciphertexts.
- Ahmadreza Rahimi Department of Computer Science E-mail:ahmadreza@virginia.edu University of Virginia, Charlottesville, VA Homepage:cs.virginia.edu/ar7bc.
All Publications. Filter by Year. Registration-Based Encryption: Removing Private-Key Generator from IBE Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody and Ahmadreza Rahimi.
Abstract
Key escrow is inherent in identity based encryption (IBE) since it was first put forward by Shamir. A key generation center (KGC) or private key generator is in charge of generating the user’s secret key, therefore a malicious one can decrypt any ciphertext without being found. This paper introduces a new scheme to eliminate key escrow from IBE. This scheme is based on the security concept of anonymous ciphertext indistinguishability against key generation center (ACI-KGC) which is introduced by Chow. We equip the Boneh and Franklin IBE (BF-IBE) and Gentry-IBE with our scheme and give the security analysis to show the accuracy and the security of it. In contrast to Chow’s scheme, to generate the secret key, our approach does not require the interactive protocol which brings about much extra costs. Zoom h4n driver mac download.
This is a preview of subscription content, log in to check access.
Registration-based Encryption Removing Private-key Generator From Ibe 1
Access options
Buy single article
37,40 €
Registration-based Encryption Removing Private-key Generator From Ibe Pdf
Price includes VAT for Germany