2010
DOI: 10.1007/978-3-642-15317-4_27
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Private-Key Generators for Identity-Based Cryptography

Abstract: Identity-based cryptography can greatly reduce the complexity of sending encrypted messages over the Internet. However, it necessarily requires a private-key generator (PKG), which can create private keys for clients, and so can passively eavesdrop on all encrypted communications. Although a distributed private-key generator has been suggested as a way to mitigate this problem, to date there have been no practical implementations provided for one. This paper presents the first realistic architecture and an imp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
67
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 74 publications
(67 citation statements)
references
References 55 publications
0
67
0
Order By: Relevance
“…The generic authentication scheme is pictorially shown in Figure 9. [33], RSA [34], bilinear pairing [35], identity based cryptography [36] are some of protocols used for secure authentication of users over cloud. Tsai and Lo [37] have recently presented an authentication scheme that makes use of bilinear pairing for secret exchanging of private keys, mutual authentication, and rendering untraceability.…”
Section: Authenticationmentioning
confidence: 99%
“…The generic authentication scheme is pictorially shown in Figure 9. [33], RSA [34], bilinear pairing [35], identity based cryptography [36] are some of protocols used for secure authentication of users over cloud. Tsai and Lo [37] have recently presented an authentication scheme that makes use of bilinear pairing for secret exchanging of private keys, mutual authentication, and rendering untraceability.…”
Section: Authenticationmentioning
confidence: 99%
“…Distributed private key generation is one of the effective solutions to the key escrow problem. In both schemes Boneh and Franklin (2003), Kate and Goldberg (2009) secret sharing methods are used for distributing private key generation among multiple PKGs.…”
Section: The Dpkg Modelmentioning
confidence: 99%
“…The drawback oft he proposed solution is that it lacks a formal security analysis. Recently, Kate and Goldberg [6] considered IBE schemes with more complex user's private key structure (distribution of such schemes requires inversion in the exponent, addition, and multiplication of shares). The authors developed a distributed private-key generators for three IBE schemes along with the security proofs in the random oracle model.…”
Section: Identity-based Encryption With Distributed Pkgmentioning
confidence: 99%
“…Firstly, we require an anonymous scheme which is secure in the standard model and sufficiently efficient, this requirement excludes many distributed schemes like Sakai-Kasahara in [20,4,6], Boneh-Franklin in [6]. Secondly, we require a scheme for which there exists a distributed version that is relatively efficient and practical, since Gentry's scheme shares similarities with Sakai-Kasahara, it can be distributed the same way as in [4,6], this requirement excludes also the scheme of Boyen-Waters [15] modified in [10] due to its complex structure of user's private-keys which makes the distribution of these schemes much more difficult. Let COM = (Setup, Commit) be a secure commitment scheme and let Π (KeyGen, Enc, Dec) be an additively homomorphic and semantically secure encryption scheme, such that Enc(e) ⊗ r = Enc(er), and Enc(a) ⊕ Enc(b) = Enc(a + b).…”
Section: Constructionmentioning
confidence: 99%