skip to main content
10.1145/3339252.3339271acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Anonymous Identity Based Encryption with Traceable Identities

Published: 26 August 2019 Publication History

Abstract

We introduce Anonymous Identity Based Encryption with Traceable Identities, in which we provide a new feature to anonymous identity-based encryption schemes: lifting the anonymity of some specific recipients in necessary situations (such as when they are suspected as criminals). Our primitive allows a tracer, given a tracing key associated to an identity, to filter all the ciphertexts that are sent to this specific identity (and only those). As it is primordial to preserve the privacy of the law-abiding users, the security takes into account the collusion of tracers and corrupted users.
We first start with the Boyen Waters IBE and then proceed further to the class of IBKEM based on Hash Proof Systems proposed by Blazy et.al [4]. By reinforcing the notion of affine MAC, we show that these IBE schemes can be transformed to AIBET. Interestingly, our transformation does not weaken the original schemes: even though the adversary is allowed to get access to some additional oracles as we add a new functionality, the security relies on the same underlying security assumptions and the efficiency is almost unchanged, only some extra keys are added but the encapsulation / decapsulation process remain the same.

References

[1]
Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, and Haixia Shi. 2005. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. In CRYPTO 2005 (LNCS), Victor Shoup (Ed.), Vol. 3621. Springer, Heidelberg, 205--222.
[2]
Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, and Guomin Yang. 2008. Traceable and Retrievable Identity-Based Encryption. In ACNS 08 (LNCS), Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, and Moti Yung (Eds.), Vol. 5037. Springer, Heidelberg, 94--110.
[3]
Mihir Bellare, Alexandra Boldyreva, Anand Desai, and David Pointcheval. 2001. Key-Privacy in Public-Key Encryption. In ASI-ACRYPT 2001 (LNCS), Colin Boyd (Ed.), Vol. 2248. Springer, Heidelberg, 566--582.
[4]
Olivier Blazy, Eike Kiltz, and Jiaxin Pan. 2014. (Hierarchical) Identity-Based Encryption from Affine Message Authentication. In CRYPTO 2014, Part I (LNCS), Juan A. Garay and Rosario Gennaro (Eds.), Vol. 8616. Springer, Heidelberg, 408--425.
[5]
Dan Boneh and Matthew K. Franklin. 2001. Identity-Based Encryption from the Weil Pairing. In CRYPTO 2001 (LNCS), Joe Kilian (Ed.), Vol. 2139. Springer, Heidelberg, 213--229.
[6]
Dan Boneh, Craig Gentry, and Michael Hamburg. 2007. Space-Efficient Identity Based Encryption Without Pairings. In 48th FOCS. IEEE Computer Society Press, 647--657.
[7]
Xavier Boyen and Brent Waters. 2006. Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). In CRYPTO 2006 (LNCS), Cynthia Dwork (Ed.), Vol. 4117. Springer, Heidelberg, 290--307.
[8]
Xavier Boyen and Brent Waters. 2006. Compact Group Signatures Without Random Oracles. In EUROCRYPT 2006 (LNCS), Serge Vaudenay (Ed.), Vol. 4004. Springer, Heidelberg, 427--444.
[9]
Jie Chen and Hoeteck Wee. 2013. Fully, (Almost) Tightly Secure IBE and Dual System Groups. In CRYPTO 2013, Part II (LNCS), Ran Canetti and Juan A. Garay (Eds.), Vol. 8043. Springer, Heidelberg, 435--460.
[10]
Clifford Cocks. 2001. An Identity Based Encryption Scheme Based on Quadratic Residues. In 8th IMA International Conference on Cryptography and Coding (LNCS), Bahram Honary (Ed.), Vol. 2260. Springer, Heidelberg, 360--363.
[11]
Alex Escala, Gottfried Herold, Eike Kiltz, Carla Ràfols, and Jorge Villar. 2013. An Algebraic Framework for Diffie-Hellman Assumptions. In CRYPTO 2013, Part II (LNCS), Ran Canetti and Juan A. Garay (Eds.), Vol. 8043. Springer, Heidelberg, 129--147.
[12]
Craig Gentry, Chris Peikert, and Vinod Vaikuntanathan. 2008. Trapdoors for hard lattices and new cryptographic constructions. In 40th ACM STOC, Richard E. Ladner and Cynthia Dwork (Eds.). ACM Press, 197--206.
[13]
Vipul Goyal. 2007. Reducing Trust in the PKG in Identity Based Cryptosystems. In CRYPTO 2007 (LNCS), Alfred Menezes (Ed.), Vol. 4622. Springer, Heidelberg, 430--447.
[14]
Aggelos Kiayias and Qiang Tang. 2015. Making Any Identity-Based Encryption Accountable, Efficiently. In ESORICS 2015, Part I (LNCS), Günther Pernul, Peter Y. A. Ryan, and Edgar R. Weippl (Eds.), Vol. 9326. Springer, Heidelberg, 326--346.
[15]
Aggelos Kiayias, Yiannis Tsiounis, and Moti Yung. 2004. Traceable Signatures. In EUROCRYPT 2004 (LNCS), Christian Cachin and Jan Camenisch (Eds.), Vol. 3027. Springer, Heidelberg, 571--589.
[16]
Adi Shamir. 1984. Identity-Based Cryptosystems and Signature Schemes. In CRYPTO'84 (LNCS), G. R. Blakley and David Chaum (Eds.), Vol. 196. Springer, Heidelberg, 47--53.
[17]
Brent R. Waters. 2005. Efficient Identity-Based Encryption Without Random Oracles. In EUROCRYPT 2005 (LNCS), Ronald Cramer (Ed.), Vol. 3494. Springer, Heidelberg, 114--127.

Cited By

View all
  • (2025)Blacklisting access control via negated subset predicate encryption: Constant-size ciphertexts/keys constructions with adaptive security or attribute hidingJournal of Information Security and Applications10.1016/j.jisa.2024.10395989(103959)Online publication date: Mar-2025
  • (2024)Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systemsComputer Standards & Interfaces10.1016/j.csi.2023.10381789:COnline publication date: 25-Jun-2024
  • (2024)Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryptionComputer Standards & Interfaces10.1016/j.csi.2023.10379688(103796)Online publication date: Mar-2024
  • Show More Cited By

Index Terms

  1. Anonymous Identity Based Encryption with Traceable Identities

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and Security
      August 2019
      979 pages
      ISBN:9781450371643
      DOI:10.1145/3339252
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 26 August 2019

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Anonymity
      2. Identity-based Encryption
      3. Revocation

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Funding Sources

      Conference

      ARES '19

      Acceptance Rates

      Overall Acceptance Rate 228 of 451 submissions, 51%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)32
      • Downloads (Last 6 weeks)4
      Reflects downloads up to 03 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Blacklisting access control via negated subset predicate encryption: Constant-size ciphertexts/keys constructions with adaptive security or attribute hidingJournal of Information Security and Applications10.1016/j.jisa.2024.10395989(103959)Online publication date: Mar-2025
      • (2024)Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systemsComputer Standards & Interfaces10.1016/j.csi.2023.10381789:COnline publication date: 25-Jun-2024
      • (2024)Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryptionComputer Standards & Interfaces10.1016/j.csi.2023.10379688(103796)Online publication date: Mar-2024
      • (2022)Optimal Black-Box Traceability in Decentralized Attribute-Based EncryptionIEEE Transactions on Cloud Computing10.1109/TCC.2022.3210137(1-14)Online publication date: 2022
      • (2021)A survey on functional encryptionAdvances in Mathematics of Communications10.3934/amc.2021049(0)Online publication date: 2021
      • (2021)Quantum‐resistant anonymous identity‐based encryption with trable identitiesIET Information Security10.1049/ise2.1204916:2(111-126)Online publication date: 23-Nov-2021
      • (2021)Anonymous Lattice Identity-Based Encryption with Traceable IdentitiesInformation Security and Privacy10.1007/978-3-030-90567-5_32(630-649)Online publication date: 4-Nov-2021
      • (2020)Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based DefinitionComputer Security – ESORICS 202010.1007/978-3-030-59013-0_4(65-85)Online publication date: 13-Sep-2020

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media