Cryptology ePrint Archive: Report 2002/072
Authenticated Identity-Based Encryption
Ben Lynn
Abstract: Suppose Alice wishes to send a message to Bob using an identity-based
encryption scheme (recall such a scheme is a public key cryptosystem where
any string is a valid public key), but desires integrity as well as
security. In other words, Alice wants Bob to know that only she could have
sent the message. Furthermore, suppose
she does not want the non-repudiation property
that would necessarily be present if she simply used an identity-based
signature scheme i.e. she does not want Bob to be able to prove
to a third party
that she is the sender.
We augment the system of Boneh and Franklin
to allow communication with integrity without nonrepudiation.
We formalize notions of security and integrity for our scheme, and show that
new encryption and decryption
algorithms are more efficient, despite being equally secure
and authenticated.
Category / Keywords: public-key cryptography /
Date: received 4 Jun 2002
Contact author: blynn at cs stanford edu
Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation
Version: 20020607:183753 (All versions of this report)
Short URL: ia.cr/2002/072
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]