Fully Secure Accountable-Authority Identity-Based Encryption

  • Amit Sahai
  • Hakan Seyalioglu
Conference paper

DOI: 10.1007/978-3-642-19379-8_19

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6571)
Cite this paper as:
Sahai A., Seyalioglu H. (2011) Fully Secure Accountable-Authority Identity-Based Encryption. In: Catalano D., Fazio N., Gennaro R., Nicolosi A. (eds) Public Key Cryptography – PKC 2011. PKC 2011. Lecture Notes in Computer Science, vol 6571. Springer, Berlin, Heidelberg


The problem of trust is one of the biggest concerns in any identity-based infrastructure where the key-generation authority (called the PKG) must choose secret keys for participants and therefore be highly trusted by all parties. While some abilities of the PKG are intrinsic to this setting, reducing this trust as much as possible is beneficial to both user and authority as the less trust is placed in it, the less an honest authority can be accused of abusing that trust. Goyal (CRYPTO 2007) defined the notion of Accountable-Authority IBE in which a dishonest PKG who had leaked a user’s private key could be proven guilty. Later, Goyal et al. (CCS 2008) asked whether it would be possible to implicate a PKG who produced an unauthorized decoder box, enabling decryption with a noticeable probability but which may not actually grant access to a well-formed key. Formally, would it be possible for a tracing algorithm to implicate a dishonest PKG given only black-box access to such a decoder? Goyal et al. could only provide such a scheme in the weaker setting of selective security, where an adversary must declare at the start of the game which identity it intends to target. In this work, we provide the first fully secure accountable-authority IBE scheme. We prove security from the standard DBDH assumption while losing none of the functionality or security of the original proposal.


Identity-Based Encryption Accountable Authority Tracing 
Download to read the full conference paper text

Copyright information

© International Association for Cryptologic Research 2011

Authors and Affiliations

  • Amit Sahai
    • 1
  • Hakan Seyalioglu
    • 1
  1. 1.The University of CaliforniaLos Angeles

Personalised recommendations