IFIP International Federation for Information Processing
DOI: 10.1007/1-4020-8141-3_6
|View full text |Cite
|
Sign up to set email alerts
|

Remove key Escrow from the Identity-Based Encryption System

Abstract: Key escrow is an inherent property in the current proposed IdentityBased Encryption (IBE) systems. However the key escrow is not always a good property for all applications. In this paper, we present a scheme which removes the key escrow from the IBE system proposed by Bonch and Franklin, while at the same time maintaining some important properties of the IBE. We also present some cryptosystems based on our variant including a signature scheme and an authenticated key agreement. We finally show how to integrat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…These issues motivate the need for an efficient model to avoid such problems. Several approaches have been proposed to remove the key escrow problem [22,31,39,44,45,46,47], either by secure key issuing or user-chosen information. Nevertheless, the advantages come with some drawbacks.…”
Section: Problem Statementsmentioning
confidence: 99%
See 2 more Smart Citations
“…These issues motivate the need for an efficient model to avoid such problems. Several approaches have been proposed to remove the key escrow problem [22,31,39,44,45,46,47], either by secure key issuing or user-chosen information. Nevertheless, the advantages come with some drawbacks.…”
Section: Problem Statementsmentioning
confidence: 99%
“…To tackle this issue, certificate-less public key encryption [46] was introduced, which provides implicit authentication to the public key with user-chosen information. A new variant of IBE [31] was proposed, which uses a combination of the key issue by PKG and some information chosen by the user as a private key.…”
Section: Existing Solutions To Key Escrow Problemmentioning
confidence: 99%
See 1 more Smart Citation
“…It combines the advantages of the ID-PKC and the PKI. Since the concept of the CL-PKC is introduced, many certificateless public key encryption (CL-PKE) and signature schemes are proposed [3][4][5][6][7][8] . However, the key agreement in CL-PKC is seldom discussed.…”
Section: Introductionmentioning
confidence: 99%
“…To solve this problem, in [11,26], Identity-based 0020-0255/$ -see front matter Ó 2007 Elsevier Inc. All public key cryptography (ID-PKC) is proposed, since the direct derivation of public keys from users' identities eliminates the needs for certificates. However, the inherent key escrow problem in ID-PKC is a great drawback [12,24]. To avoid the inherent key escrow of identity-based cryptography, in [3], Al-Riyami and Paterson introduce and make concrete the concept of Certificateless Public Key Cryptography (CL-PKC), a model which does not require certificates to guarantee the authenticity of public keys.…”
Section: Introductionmentioning
confidence: 99%