We formalize this notion as {\em blind IBE} and discuss the many practical applications of such a scheme. In particular, we build upon the recent work of Camenisch, Neven, and shelat in Eurocrypt 2007 to construct oblivious transfer (OT) schemes which achieve full simulatability for both sender and receiver. OT constructions with comparable efficiency prior to Camenisch et al.\ were proven secure in the weaker half-simulation model. Our OT schemes can be constructed generically from any blind IBE, and thus require only static complexity assumptions (e.g., DBDH) whereas prior comparable schemes require dynamic complexity assumptions (e.g., $q$-PDDH).
Category / Keywords: cryptographic protocols / identity-based encryption, oblivious transfer, blind key extraction Date: received 14 Jun 2007, last revised 2 May 2008 Contact author: mgreen at cs jhu edu Available format(s): PDF | BibTeX Citation Note: An extended abstract of this paper appeared in ASIACRYPT 2007. This is the full version. Version: 20080502:155616 (All versions of this report) Short URL: ia.cr/2007/235 Discussion forum: Show discussion | Start new discussion