Abstract
Identity-based encryption (IBE) is a form of public key infrastructure (PKI) which has become a hot topic of research among the research community as IBE enables senders to encode data without interfering with the public key certificate. IBE computes the public key from the unique recipient’s identity and authenticates by a third party so as to overcome the limitations faced by traditional cryptographic techniques. In 2004, D. Boneh and X. Boyen worked towards IBE without using random oracles which is one of the most popular and efficient IBE techniques. This chapter focuses on the Boneh-Boyen IBE technique which is based on selective identity and gives good results in standard model. It also enlightens on the basic IBE model introduction and its working to get a clear idea about IBE. Later on, this document covers the Boneh-Boyen basic scheme that is classified into two categories, additive scheme and multiplicative scheme. These schemes are explained in detail with the help of four main stages: parameter setup, extraction, encryption, and decryption process. Apart from the basic scheme, Boneh-Boyen full scheme is explained here which helps to compute the public key of the receiver. At the end, the chapter emphasizes on the security concept of the Boneh-Boyen IBE.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the Association for Computing Machinery, 21(2), 120–126.
Pang, L., Li, H., & Wang, Y. (2013). NMIBAS: A novel multi-receiver ID-based anonymous signcryption with decryption fairness. Computing and Informatics, 32(3), 441–460.
Pang, L., Li, H., & Pei, Q. (2012). Improved multicast key management of Chinese wireless local area network security standard. IET Communications, 6(9), 1126–1130.
Boneh, D., & Boyen, X. (2004). Efficient selective-ID secure identity-based encryption without random oracles. In C. Cachin & J. L. Camenisch (Eds.), EUROCRYPT 2004. LNCS (Vol. 3027, pp. 223–238). Heidelberg: Springer.
Boyen, X. (2007). General ad hoc encryption from exponent inversion IBE. In M. Naor (Ed.), EUROCRYPT 2007. LNCS (Vol. 4515, pp. 394–411). Heidelberg: Springer.
Cocks, C. (2001). An identity based encryption scheme based on quadratic residues. In Proceedings of the 8th IMA International Conference on Cryptography and Coding.
Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In Advances in cryptology—CRYPTO 2001, volume 2139 of lecture notes in computer science (pp. 213–229). Springer-Verlag.
Mitsunari, S., Sakai, R., & Kasahara, M. (2002). A new traitor tracing. IEICE Transactions on Fundamentals, E85-A(2), 481–484.
Ryuichi Sakai and Masao Kasahara. ID based cryptosystems with pairing over elliptic curve. Cryptology ePrint archive, Report 2003/054, 2003. http://eprint.iacr.org/2003/054/.
Liqun Chen, Zhaohui Cheng, John Malone-Lee, and Nigel P. Smart. An efficient ID-KEM based on the Sakai-Kasahara key construction. Cryptology ePrint Archive, Report 2005/224, 2005. http://eprint.iacr.org/2005/224/.
Gentry, C. (2006). Practical identity-based encryption without random oracles. In Advances in cryptology—EUROCRYPT 2006, lecture notes in computer science. Springer-Verlag.
Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. In Advances in cryptology— EUROCRYPT 2005, volume 3494 of lecture notes in computer science. Springer-Verlag.
Waters, B. (2005). Efficient identity-based encryption without random oracles. In Advances in cryptology—EUROCRYPT 2005, volume 3494 of lecture notes in computer science. Springer-Verlag.
Sanjit Chatterjee and Palash Sarkar. Trading time for space: Towards an efficient IBE scheme with short(er) public parameters in the standard model. In Proceedings of ICISC 2005, 2005.
Naccache, D. (2005). Secure and practical identity-based encryption. In Cryptology ePrint Archive, Report 2005/369. http://eprint.iacr.org/2005/369/.
Brent Waters, Lecture 7: Boneh-Boyen Proof & Waters IBE System 1 Review, CS395T Advanced Cryptography, 2009. https://www.cs.utexas.edu/~rashid/395Tcrypt/4_1.pdf
Martin, L. Introduction to identity based encryption, information security and privacy series. Artech House.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Karale, A., Poulkov, V., Lazarova, M., Koleva, P. (2021). Boneh-Boyen IBE. In: Ahmad, K.A.B., Ahmad, K., Dulhare, U.N. (eds) Functional Encryption. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-60890-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-60890-3_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-60889-7
Online ISBN: 978-3-030-60890-3
eBook Packages: EngineeringEngineering (R0)