EconPapers    
Economics at your fingertips  
 

Remove key escrow from the BF and Gentry identity-based encryption with non-interactive key generation

Quanyun Wei (), Fang Qi () and Zhe Tang ()
Additional contact information
Quanyun Wei: Central South University
Fang Qi: Central South University
Zhe Tang: Central South University

Telecommunication Systems: Modelling, Analysis, Design and Management, 2018, vol. 69, issue 2, No 8, 253-262

Abstract: Abstract Key escrow is inherent in identity based encryption (IBE) since it was first put forward by Shamir. A key generation center (KGC) or private key generator is in charge of generating the user’s secret key, therefore a malicious one can decrypt any ciphertext without being found. This paper introduces a new scheme to eliminate key escrow from IBE. This scheme is based on the security concept of anonymous ciphertext indistinguishability against key generation center (ACI-KGC) which is introduced by Chow. We equip the Boneh and Franklin IBE (BF-IBE) and Gentry-IBE with our scheme and give the security analysis to show the accuracy and the security of it. In contrast to Chow’s scheme, to generate the secret key, our approach does not require the interactive protocol which brings about much extra costs.

Keywords: Identity based encryption; Key escrow; ACI-KGC; Non-interactive protocol (search for similar items in EconPapers)
Date: 2018
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
http://link.springer.com/10.1007/s11235-018-0461-1 Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:telsys:v:69:y:2018:i:2:d:10.1007_s11235-018-0461-1

Ordering information: This journal article can be ordered from
http://www.springer.com/journal/11235

DOI: 10.1007/s11235-018-0461-1

Access Statistics for this article

Telecommunication Systems: Modelling, Analysis, Design and Management is currently edited by Muhammad Khan

More articles in Telecommunication Systems: Modelling, Analysis, Design and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-20
Handle: RePEc:spr:telsys:v:69:y:2018:i:2:d:10.1007_s11235-018-0461-1