Abstract
Since Boneh and Franklin published their seminal paper on identity based encryption (IBE) using the Weil pairing, there has been a great deal of interest in cryptographic primitives based on elliptic-curve pairings. One particularly interesting application has been to control access to data, via possibly complex policies. In this paper we continue the research in this vein. We present an encryption scheme such that the receiver of an encrypted message can only decrypt if it satisfies a particular policy chosen by the sender at the time of encryption. Unlike standard IBE, our encryption scheme is escrow free in that no credential-issuing authority (or colluding set of credential-issuing authorities) is able to decrypt ciphertexts itself, providing the users' public keys are properly certified. In addition we describe a security model for the scenario in question and provide proofs of security for our scheme (in the random oracle model).
Similar content being viewed by others
References
Al-Riyami, S.S.: Cryptographic schemes based on elliptic curve pairings. Ph.D. Thesis, Royal Holloway, University of London (2004)
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Advances in cryptology—ASIACRYPT 2003. Springer-Verlag LNCS 2894, pp. 452–473 (2003)
Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. In: Advances in cryptology—CRYPTO '88. Springer-Verlag LNCS 403, pp. 27–35 (1990)
Blake, I.F., Seroussi, G., Smart, N.P.: Advances in elliptic curve cryptography. Cambridge University Press, Cambridge (2005)
Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. In: Advances in cryptology—CRYPTO 2001. Springer-Verlag LNCS 2139, pp. 213–229 (2001)
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Advances in cryptology—ASIACRYPT 2001. Springer-Verlag LNCS 2248, pp. 514–532 (2001)
Bradshaw, R.W., Holt, J.E., Seamons, K.E.: Concealing complex policies with hidden credentials. In: Proceedings of the 11th ACM Conference on Computer and Communications Security (2004)
Chen, L., Harrison, K., Soldera, D., Smart, N.P.: Applications of multiple trust authorities in pairing based cryptosystems. In: Infrastructure Security: InfraSec 2002. Springer-Verlag LNCS 2437, pp. 260–275 (2002)
Duursma, I., Lee, H.-S.: Tate pairing implementation for hyperelliptic curves y 2 = x p−x+d. In: Advances in Cryptology—ASIACRYPT 2003. Springer-Verlag LNCS 2894, pp. 111–123 (2003)
Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Advances in cryptology—CRYPTO '99. Springer-Verlag LNCS 1666, pp. 537–554 (1999)
Holt, J.E., Bradshaw, R.W., Seamons, K.E., Orman, H.: Hidden credentials. In: 2nd ACM Workshop on Privacy in the Electronic Society, pp. 1–8 (2003)
Li, N., Du, W., Boneh, D.: Oblivious signature-based envelope. In: 22nd ACM Symposium on Principles of Distributed Computing (PODC), pp. 182–189 (2003)
Paterson, K.G.: Cryptography from pairings: a snapshot of current research. Information Security Technical Report 7, 41–54 (2002)
Rackoff, C., Simon, D.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Advances in cryptology—CRYPTO '91. Springer-Verlag LNCS 576, pp. 433–444 (1992)
Shamir, A.: How to share a secret. Communications of the ACM 22, 612–613 (1979)
Shoup, V.: OAEP Reconsidered, In: Advances in cryptology—CRYPTO 2001. Springer-Verlag LNCS 2139, pp. 239–259 (2001)
Smart, N.P.: Access control using pairing based cryptography. In: Topics in cryptology—CT-RSA 2003. Springer-Verlag LNCS 2612, pp. 111–121 (2003)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Al-Riyami, S.S., Malone-Lee, J. & Smart, N.P. Escrow-free encryption supporting cryptographic workflow. Int. J. Inf. Secur. 5, 217–229 (2006). https://doi.org/10.1007/s10207-006-0002-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-006-0002-x