Skip to main content
  • 160 Accesses

Verifiable encryption is an encryption scheme where one can prove some property of a message m, while the message is given in an encrypted form. When an encryption scheme is secure, the encryption E(m) should reveal no information regarding m. But this property may not be suitable in cases where checking a property of the encrypted content is required before processing the encrypted data. Verifiable encryption is useful in such cases. An example of such a case0 is akey escrow scheme. In key escrow schemes, a sender wants to prove that a key given in an encrypted form under the escrow agent's public key is indeed the right key to decrypt the encrypted message that the sender is transmitting to the receiver. Another example is a group signature scheme where the information to identify the signer is encrypted under the public key of the trusted group authority (also known as group manager) so that the authority can trace the signer in a case of dispute.

Verifiable encryption is also used...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Camenisch, J. and I. Damgård (2000). “Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes.” Proceedings of AłSIACRYPT 2000, Lecture Notes in Computer Science, vol. 1976, ed., T. Okamoto. Springer, Berlin, 331–345.

    Google Scholar 

  2. Camenisch, J. and V. Shoup (2003). “Practical verifiable encryption and decryption of discrete logarithms.” Proceedings of CRYPTO 2003, Lecture Notes in Computer Science, vol. 2729, ed. D. Boneh. Springer, Berlin, 126–144.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Sako, K. (2005). Verifiable Encryption. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_451

Download citation

Publish with us

Policies and ethics