Skip to main content
Log in

Escrow-free encryption supporting cryptographic workflow

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

Since Boneh and Franklin published their seminal paper on identity based encryption (IBE) using the Weil pairing, there has been a great deal of interest in cryptographic primitives based on elliptic-curve pairings. One particularly interesting application has been to control access to data, via possibly complex policies. In this paper we continue the research in this vein. We present an encryption scheme such that the receiver of an encrypted message can only decrypt if it satisfies a particular policy chosen by the sender at the time of encryption. Unlike standard IBE, our encryption scheme is escrow free in that no credential-issuing authority (or colluding set of credential-issuing authorities) is able to decrypt ciphertexts itself, providing the users' public keys are properly certified. In addition we describe a security model for the scenario in question and provide proofs of security for our scheme (in the random oracle model).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Al-Riyami, S.S.: Cryptographic schemes based on elliptic curve pairings. Ph.D. Thesis, Royal Holloway, University of London (2004)

  2. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Advances in cryptology—ASIACRYPT 2003. Springer-Verlag LNCS 2894, pp. 452–473 (2003)

  3. Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. In: Advances in cryptology—CRYPTO '88. Springer-Verlag LNCS 403, pp. 27–35 (1990)

  4. Blake, I.F., Seroussi, G., Smart, N.P.: Advances in elliptic curve cryptography. Cambridge University Press, Cambridge (2005)

    MATH  Google Scholar 

  5. Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. In: Advances in cryptology—CRYPTO 2001. Springer-Verlag LNCS 2139, pp. 213–229 (2001)

  6. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Advances in cryptology—ASIACRYPT 2001. Springer-Verlag LNCS 2248, pp. 514–532 (2001)

  7. Bradshaw, R.W., Holt, J.E., Seamons, K.E.: Concealing complex policies with hidden credentials. In: Proceedings of the 11th ACM Conference on Computer and Communications Security (2004)

  8. Chen, L., Harrison, K., Soldera, D., Smart, N.P.: Applications of multiple trust authorities in pairing based cryptosystems. In: Infrastructure Security: InfraSec 2002. Springer-Verlag LNCS 2437, pp. 260–275 (2002)

  9. Duursma, I., Lee, H.-S.: Tate pairing implementation for hyperelliptic curves y 2 = x px+d. In: Advances in Cryptology—ASIACRYPT 2003. Springer-Verlag LNCS 2894, pp. 111–123 (2003)

  10. Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Advances in cryptology—CRYPTO '99. Springer-Verlag LNCS 1666, pp. 537–554 (1999)

  11. Holt, J.E., Bradshaw, R.W., Seamons, K.E., Orman, H.: Hidden credentials. In: 2nd ACM Workshop on Privacy in the Electronic Society, pp. 1–8 (2003)

  12. Li, N., Du, W., Boneh, D.: Oblivious signature-based envelope. In: 22nd ACM Symposium on Principles of Distributed Computing (PODC), pp. 182–189 (2003)

  13. Paterson, K.G.: Cryptography from pairings: a snapshot of current research. Information Security Technical Report 7, 41–54 (2002)

    Article  Google Scholar 

  14. Rackoff, C., Simon, D.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Advances in cryptology—CRYPTO '91. Springer-Verlag LNCS 576, pp. 433–444 (1992)

  15. Shamir, A.: How to share a secret. Communications of the ACM 22, 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  16. Shoup, V.: OAEP Reconsidered, In: Advances in cryptology—CRYPTO 2001. Springer-Verlag LNCS 2139, pp. 239–259 (2001)

  17. Smart, N.P.: Access control using pairing based cryptography. In: Topics in cryptology—CT-RSA 2003. Springer-Verlag LNCS 2612, pp. 111–121 (2003)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. P. Smart.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Al-Riyami, S.S., Malone-Lee, J. & Smart, N.P. Escrow-free encryption supporting cryptographic workflow. Int. J. Inf. Secur. 5, 217–229 (2006). https://doi.org/10.1007/s10207-006-0002-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-006-0002-x

Keywords

Navigation