Sciweavers

Share
ACISP
2009
Springer

Building Key-Private Public-Key Encryption Schemes

8 years 11 months ago
Building Key-Private Public-Key Encryption Schemes
In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts corresponding to the same message and identity, but generated using different TA master public-keys. This security property has applications in the prevention of traffic analysis in coalition networking environments. In this paper, we examine the implications of TA anonymity for key-privacy for normal public-key encryption (PKE) schemes. Key-privacy for PKE captures the requirement that ciphertexts should not leak any information about the public-keys used to perform encryptions. Thus key-privacy guarantees recipient anonymity for a PKE scheme. Canetti, Halevi and Katz (CHK) gave a generic transform which constructs an IND-CCA secure PKE scheme using an identitybased encryption (IBE) scheme that is selective-id IND-CPA secure and a strongly secure one-time signature scheme. Their transform works in the standard model (...
Kenneth G. Paterson, Sriramkrishnan Srinivasan
Added 25 May 2010
Updated 25 May 2010
Type Conference
Year 2009
Where ACISP
Authors Kenneth G. Paterson, Sriramkrishnan Srinivasan
Comments (0)
books