A NEW DECENTRALIZED IDENTITY-BASED ENCRYPTION SCHEME

Xuân Lâm Lê 1, Vũ Nam Lưu2, Viết Cường Trịnh3,
1 Lớp K16 Khoa học Máy tính, Khoa Kỹ thuật, Công nghệ và Truyền thông
2 Trường Đại học Văn hóa, Thể thao và Du lịch
3 Hong Duc University

Main Article Content

Abstract

Identity-based cryptography is an important technique since it can replace the inefficient public key infrashstructure. This technique however has a shortcoming that the authority can know the secret key of user. To deal with this shortcoming of Identity-based cryptography, researchers try to decentralize the authority. Continue on this line of work, in this paper we propose a new identity-based encryption scheme supporting decentralized property. Our proposed scheme can be comparable to other existing identity-based encryption schemes supporting decentralized property

Article Details

References

[1] D. Boneh, M. K. Franklin (2001), Identity-based encryption from the weil pairing, In CRYPTO, Lecture Notes in Computer Science, J. Kilian, Ed., vol. 2139. Springer, pp. 213-229.
[2] A. Shamir (1984), Identity-based cryptosystems and signature schemes, In G. R. Blakley and D. Chaum, editors, Advances in Cryptology - CRYPTO'84.
[3] Hoteck Wee (2016), DéJà Q Uncore!Un Petit IBE, In Eyal Kushilevitz and Tal Malkin, editors, TCC 2016: 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Springer LNCS Proceedings, Part II.
[4] Daniel R. L. Brown, Matthew J. Campagna and Scott A. Vanstone (2011), Security of ECQV-Certified ECDSA Against Passive Adversaries.
[5] S. Al-Riyami, K. G. Paterson (2003),Certificateless public key cryptography. In C.-S. Laih, editor, Advances in Cryptology - ASIACRYPT.
[6] Noemi Glaeser, Dimitris Kolonelos, Giulio Malavolta, Ahmadreza Rahimi (2023), Efficient Registration-based encryption. CCS '23: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp.1065 - 1079. https://doi.org/10.1145/3576915.3616596.
[7] A. B. Lewko, B. Waters (2011), Decentralizing attribute-based encryption, In K. G. Paterson, editor, Advances in Cryptology EUROCRYPT 2011, vol.6632 of Lecture Notes in Computer Science, pp. 568-588, Tallinn, Estonia, May 15-19. Springer, Berlin, Germany.
[8] Qutaibah M Malluhi, Abdullatif Shikfa, Vinh Duc Tran, Viet Cuong Trinh (2019), Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices, Computer Communications journal, vol.145, pp.113-125, Elsvier.
[9] Chuangui Ma, Aijun Ge, Jie Zhang (2019), Fully Secure Decentralized Ciphertext-Policy Attribute-Based Encryption in Standard Model, Proceedings of Information Security and Cryptology: Inscrypt January 2019. DOI: 10.1007/978-3-030-14234-6-23, Springer Berlin Heidelberg, Berlin, Heidelberg.