About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I

Research Article

Anonymous Key Issuing Protocol with Certified Identities in Identity-Based Encryption

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-64948-6_16,
        author={Yanqing Yang and Jian Wang},
        title={Anonymous Key Issuing Protocol with Certified Identities in Identity-Based Encryption},
        proceedings={Security and Privacy in Communication Networks. 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I},
        proceedings_a={SECURECOMM},
        year={2024},
        month={10},
        keywords={Identity-based encryption Key escrow Anonymous key issuing},
        doi={10.1007/978-3-031-64948-6_16}
    }
    
  • Yanqing Yang
    Jian Wang
    Year: 2024
    Anonymous Key Issuing Protocol with Certified Identities in Identity-Based Encryption
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-031-64948-6_16
Yanqing Yang1,*, Jian Wang1
  • 1: Nanjing University of Aeronautics and Astronautics
*Contact email: aurora2020_y@163.com

Abstract

Identity-based encryption can simplify the certificate management problem of traditional public key cryptosystem. But it also has an inherent drawback, called the key escrow problem. A malicious key generation center (KGC) can easily generate the user’s private key to decrypt ciphertexts or perform illegal activities. In this paper, we propose an anonymous key issuing-based IBE protocol to solve the key escrow problem. The protocol separates the tasks of authentication and key generation, which are respectively implemented by two authorities. Identity-certifying authority (ICA) authenticates the user and collaborates with him to generate a pseudo-identity to hide the real one, and issues an evidence to prove its validity. KGC generates private keys for users based on their pseudo-identities. We prove the security based on recipient anonymity and ciphertext indistinguishability, with the assumption that KGC does not collude with ICA. Compared with Emura’s work, we weaken the communication restriction between KGC and ICA by allowing KGC to access the identity list stored by ICA arbitrarily, and only restrict its query method during the key generation phase, making it accessible through the index. This lowers the security assumption and makes it more realistic. Meanwhile, we eliminate the need for secure channels using blinding technique, and only require authentication channels to ensure that messages are not being tampered with. Our protocol has higher security and utility.

Keywords
Identity-based encryption Key escrow Anonymous key issuing
Published
2024-10-13
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-64948-6_16
Copyright © 2023–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL