Towards Anonymous Ciphertext Indistinguishability with Identity Leakage
Key escrow is a major drawback of identity-based encryption (IBE). The key generation centre (KGC) can generate the user secret key of any user by using the master secret key and the user’s identity. This paper presents a systematic study of what it takes to prevent a malicious KGC from decrypting a ciphertext encrypted for an honest user, which covers the case for certificateless encryption, and shows the impossibility of ideal escrow-free IBE, unless there is uncertainty in the user’s identity.
Our study also explains the underpinning idea of anonymous ciphertext indistinguishability (ACI), formalized by Chow in PKC 2009. An ACI-secure IBE prevent a KGC (or any logical entity which get holds of the master secret key, such as the collusion of a number of authorities holding the sufficient number of master secret’s shares) from decrypting if it does not know the intended recipient of the ciphertext, a guarantee that none of the existing attempts in the literature can provide.
The notion of ACI crucially relies on the privacy of user’s identity in the eyes of the KGC. The only privacy leakage allowed in Chow’s model is via querying an embedded-identity encryption oracle. In this paper, we strengthen his model to allow arbitrary bounded leakage of the recipient’s identity. We also give a generic construction on how to achieve this notion when the identity has enough entropy.
Keywordsidentity-based encryption anonymous ciphertext indistinguishability key escrow leakage
Unable to display preview. Download preview PDF.
- 4.Chow, S.S.M.: Certificateless Encryption. In: Identity-Based Cryptography, pp. 135–155. IOS Press (2008)Google Scholar
- 11.Goyal, V., Lu, S., Sahai, A., Waters, B.: Black-box accountable authority identity-based encryption. In: CCS 2008, pp. 427–436. ACM (2008)Google Scholar
- 19.Chow, S.S.M.: New Privacy-Preserving Architectures for Identity-/Attribute-based Encryption. PhD thesis, New York University (2010)Google Scholar
- 20.Dodis, Y., Lewko, A.B., Waters, B., Wichs, D.: Storing Secrets on Continually Leaky Devices. In: Ostrovsky, R. (ed.) FOCS 2011, pp. 688–697. IEEE (2011)Google Scholar