Improving User Privacy in Identity-Based Encryption Environments

The promise of identity-based systems is that they maintain the functionality of public key cryptography while eliminating the need for public key certificates. The first efficient identity-based encryption (IBE) scheme was proposed by Boneh and Franklin in 2001; variations have been proposed by man...

Full description

Bibliographic Details
Main Author: Carlisle Adams
Format: Article
Language:English
Published: MDPI AG 2022-11-01
Series:Cryptography
Subjects:
Online Access:https://www.mdpi.com/2410-387X/6/4/55
_version_ 1797460764057927680
author Carlisle Adams
author_facet Carlisle Adams
author_sort Carlisle Adams
collection DOAJ
description The promise of identity-based systems is that they maintain the functionality of public key cryptography while eliminating the need for public key certificates. The first efficient identity-based encryption (IBE) scheme was proposed by Boneh and Franklin in 2001; variations have been proposed by many researchers since then. However, a common drawback is the requirement for a private key generator (PKG) that uses its own master private key to compute private keys for end users. Thus, the PKG can potentially decrypt all ciphertext in the environment (regardless of who the intended recipient is), which can have undesirable privacy implications. This has led to limited adoption and deployment of IBE technology. There have been numerous proposals to address this situation (which are often characterized as methods to reduce trust in the PKG). These typically involve threshold mechanisms or separation-of-duty architectures, but unfortunately often rely on non-collusion assumptions that cannot be guaranteed in real-world settings. This paper proposes a separation architecture that instantiates several intermediate CAs (ICAs), rather than one (as in previous work). We employ digital credentials (containing a specially-designed attribute based on bilinear maps) as the blind tokens issued by the ICAs, which allows a user to easily obtain multiple layers of pseudonymization prior to interacting with the PKG. As a result, our proposed architecture does not rely on unrealistic non-collusion assumptions and allows a user to reduce the probability of a privacy breach to an arbitrarily small value.
first_indexed 2024-03-09T17:10:37Z
format Article
id doaj.art-b9f2d38f434f48288926445aea69377f
institution Directory Open Access Journal
issn 2410-387X
language English
last_indexed 2024-03-09T17:10:37Z
publishDate 2022-11-01
publisher MDPI AG
record_format Article
series Cryptography
spelling doaj.art-b9f2d38f434f48288926445aea69377f2023-11-24T14:09:01ZengMDPI AGCryptography2410-387X2022-11-01645510.3390/cryptography6040055Improving User Privacy in Identity-Based Encryption EnvironmentsCarlisle Adams0School of Electrical Engineering and Comuter Science (EECS), University of Ottawa, Ottawa, ON M3J 1P3, CanadaThe promise of identity-based systems is that they maintain the functionality of public key cryptography while eliminating the need for public key certificates. The first efficient identity-based encryption (IBE) scheme was proposed by Boneh and Franklin in 2001; variations have been proposed by many researchers since then. However, a common drawback is the requirement for a private key generator (PKG) that uses its own master private key to compute private keys for end users. Thus, the PKG can potentially decrypt all ciphertext in the environment (regardless of who the intended recipient is), which can have undesirable privacy implications. This has led to limited adoption and deployment of IBE technology. There have been numerous proposals to address this situation (which are often characterized as methods to reduce trust in the PKG). These typically involve threshold mechanisms or separation-of-duty architectures, but unfortunately often rely on non-collusion assumptions that cannot be guaranteed in real-world settings. This paper proposes a separation architecture that instantiates several intermediate CAs (ICAs), rather than one (as in previous work). We employ digital credentials (containing a specially-designed attribute based on bilinear maps) as the blind tokens issued by the ICAs, which allows a user to easily obtain multiple layers of pseudonymization prior to interacting with the PKG. As a result, our proposed architecture does not rely on unrealistic non-collusion assumptions and allows a user to reduce the probability of a privacy breach to an arbitrarily small value.https://www.mdpi.com/2410-387X/6/4/55identity-based encryptionreducing trustprivacydigital credentials
spellingShingle Carlisle Adams
Improving User Privacy in Identity-Based Encryption Environments
Cryptography
identity-based encryption
reducing trust
privacy
digital credentials
title Improving User Privacy in Identity-Based Encryption Environments
title_full Improving User Privacy in Identity-Based Encryption Environments
title_fullStr Improving User Privacy in Identity-Based Encryption Environments
title_full_unstemmed Improving User Privacy in Identity-Based Encryption Environments
title_short Improving User Privacy in Identity-Based Encryption Environments
title_sort improving user privacy in identity based encryption environments
topic identity-based encryption
reducing trust
privacy
digital credentials
url https://www.mdpi.com/2410-387X/6/4/55
work_keys_str_mv AT carlisleadams improvinguserprivacyinidentitybasedencryptionenvironments