Paper 2009/355
Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography
Aniket Kate and Ian Goldberg
Abstract
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages over the Internet. However, an IBE scheme necessarily requires a private-key generator (PKG), which can create private keys for clients, and so can passively eavesdrop on all encrypted communications. Although a distributed PKG has been suggested as a way to mitigate this problem for Boneh and Franklin's IBE scheme, the security of this distributed protocol has not been proven and the proposed solution does not work over the asynchronous Internet. Further, a distributed PKG has not been considered for any other IBE scheme. In this paper, we design distributed PKG setup and private key extraction protocols in an asynchronous communication model for three important IBE schemes; namely, Boneh and Franklin's IBE, Sakai and Kasahara's IBE, and Boneh and Boyen's BB1-IBE. We give special attention to the applicability of our protocols to all possible types of bilinear pairings and prove their IND-ID-CCA security in the random oracle model. Finally, we also perform a comparative analysis of these protocols and present recommendations for their use.
Note: This is an extended version of our paper appearing in 7th Conference on Security and Cryptography for Networks (SCN 2010).
Metadata
- Available format(s)
- PDF PS
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Asynchronous communication modelIdentity-based encryption (IBE)Private-key generator (PKG)Distributed key generation (DKG)
- Contact author(s)
- akate @ cs uwaterloo ca
- History
- 2010-07-23: last of 3 revisions
- 2009-07-21: received
- See all versions
- Short URL
- https://ia.cr/2009/355
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2009/355, author = {Aniket Kate and Ian Goldberg}, title = {Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography}, howpublished = {Cryptology {ePrint} Archive, Paper 2009/355}, year = {2009}, url = {https://eprint.iacr.org/2009/355} }