Britta Hale
CARIBE: Cascaded IBE for maximum flexibility and user-side control
Hale, Britta; Carr, Christopher; Gligoroski, Danilo
Authors
Abstract
© Springer International Publishing AG 2017. Mass surveillance and a lack of end-user encryption, coupled with a growing demand for key escrow under legal oversight and certificate authority security concerns, raise the question of the appropriateness of continued general dependency on PKI. Under this context, we examine Identity-Based Encryption (IBE) as an alternative to public-key encryption. Cascade encryption, or sequential multiple encryption, is the concept of layering encryption such that the ciphertext from one encryption step is the plaintext of the next. We describe CARIBE, a cascaded IBE scheme, for which we also provide a cascaded CCA security experiment, IND-ID-C.CCA, and prove its security in the computational model. CARIBE combines the ease-of-use of IBE with key escrow, limited to the case when the entire set of participating PKGs collaborate. Furthermore, we describe a particular CARIBE scheme, CARIBE-S, where the receiver is a self-PKG – one of the several PKGs included in the cascade. CARIBE-S inherits IND-ID-C.CCA from CARIBE, and avoids key escrow entirely. In essence, CARIBE-S offers the maximum flexibility of the IBE paradigm and gives the users complete control without the key escrow problem.
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | International Conference on Cryptology: Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology |
Start Date | Dec 1, 2016 |
End Date | Dec 2, 2016 |
Acceptance Date | Sep 1, 2016 |
Online Publication Date | Jul 14, 2017 |
Publication Date | Jul 14, 2017 |
Deposit Date | Feb 25, 2020 |
Publisher | Springer Verlag |
Volume | 10311 |
Pages | 389-408 |
Series Title | Lecture Notes in Computer Science |
ISBN | 9783319612720 |
DOI | https://doi.org/10.1007/978-3-319-61273-7_19 |
Public URL | https://uwe-repository.worktribe.com/output/5541130 |
You might also like
A guide to fully homomorphic encryption
(2015)
Journal Article
Zero-Knowledge Proof of Decryption for FHE Ciphertexts
(2018)
Journal Article
Security properties of light clients on the ethereum blockchain
(2020)
Journal Article
Toward sustainable wearable electronic textiles
(2022)
Journal Article
Bitcoin unchained
(2017)
Journal Article