Skip to main content

Boneh-Boyen IBE

  • Chapter
  • First Online:
Functional Encryption

Part of the book series: EAI/Springer Innovations in Communication and Computing ((EAISICC))

  • 708 Accesses

Abstract

Identity-based encryption (IBE) is a form of public key infrastructure (PKI) which has become a hot topic of research among the research community as IBE enables senders to encode data without interfering with the public key certificate. IBE computes the public key from the unique recipient’s identity and authenticates by a third party so as to overcome the limitations faced by traditional cryptographic techniques. In 2004, D. Boneh and X. Boyen worked towards IBE without using random oracles which is one of the most popular and efficient IBE techniques. This chapter focuses on the Boneh-Boyen IBE technique which is based on selective identity and gives good results in standard model. It also enlightens on the basic IBE model introduction and its working to get a clear idea about IBE. Later on, this document covers the Boneh-Boyen basic scheme that is classified into two categories, additive scheme and multiplicative scheme. These schemes are explained in detail with the help of four main stages: parameter setup, extraction, encryption, and decryption process. Apart from the basic scheme, Boneh-Boyen full scheme is explained here which helps to compute the public key of the receiver. At the end, the chapter emphasizes on the security concept of the Boneh-Boyen IBE.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the Association for Computing Machinery, 21(2), 120–126.

    Article  MathSciNet  Google Scholar 

  2. Pang, L., Li, H., & Wang, Y. (2013). NMIBAS: A novel multi-receiver ID-based anonymous signcryption with decryption fairness. Computing and Informatics, 32(3), 441–460.

    MathSciNet  MATH  Google Scholar 

  3. Pang, L., Li, H., & Pei, Q. (2012). Improved multicast key management of Chinese wireless local area network security standard. IET Communications, 6(9), 1126–1130.

    Article  Google Scholar 

  4. Boneh, D., & Boyen, X. (2004). Efficient selective-ID secure identity-based encryption without random oracles. In C. Cachin & J. L. Camenisch (Eds.), EUROCRYPT 2004. LNCS (Vol. 3027, pp. 223–238). Heidelberg: Springer.

    Chapter  Google Scholar 

  5. Boyen, X. (2007). General ad hoc encryption from exponent inversion IBE. In M. Naor (Ed.), EUROCRYPT 2007. LNCS (Vol. 4515, pp. 394–411). Heidelberg: Springer.

    Chapter  Google Scholar 

  6. Cocks, C. (2001). An identity based encryption scheme based on quadratic residues. In Proceedings of the 8th IMA International Conference on Cryptography and Coding.

    Google Scholar 

  7. Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In Advances in cryptology—CRYPTO 2001, volume 2139 of lecture notes in computer science (pp. 213–229). Springer-Verlag.

    Google Scholar 

  8. Mitsunari, S., Sakai, R., & Kasahara, M. (2002). A new traitor tracing. IEICE Transactions on Fundamentals, E85-A(2), 481–484.

    Google Scholar 

  9. Ryuichi Sakai and Masao Kasahara. ID based cryptosystems with pairing over elliptic curve. Cryptology ePrint archive, Report 2003/054, 2003. http://eprint.iacr.org/2003/054/.

    Google Scholar 

  10. Liqun Chen, Zhaohui Cheng, John Malone-Lee, and Nigel P. Smart. An efficient ID-KEM based on the Sakai-Kasahara key construction. Cryptology ePrint Archive, Report 2005/224, 2005. http://eprint.iacr.org/2005/224/.

    Google Scholar 

  11. Gentry, C. (2006). Practical identity-based encryption without random oracles. In Advances in cryptology—EUROCRYPT 2006, lecture notes in computer science. Springer-Verlag.

    Google Scholar 

  12. Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. In Advances in cryptology— EUROCRYPT 2005, volume 3494 of lecture notes in computer science. Springer-Verlag.

    Google Scholar 

  13. Waters, B. (2005). Efficient identity-based encryption without random oracles. In Advances in cryptology—EUROCRYPT 2005, volume 3494 of lecture notes in computer science. Springer-Verlag.

    Google Scholar 

  14. Sanjit Chatterjee and Palash Sarkar. Trading time for space: Towards an efficient IBE scheme with short(er) public parameters in the standard model. In Proceedings of ICISC 2005, 2005.

    Google Scholar 

  15. Naccache, D. (2005). Secure and practical identity-based encryption. In Cryptology ePrint Archive, Report 2005/369. http://eprint.iacr.org/2005/369/.

    Google Scholar 

  16. Brent Waters, Lecture 7: Boneh-Boyen Proof & Waters IBE System 1 Review, CS395T Advanced Cryptography, 2009. https://www.cs.utexas.edu/~rashid/395Tcrypt/4_1.pdf

    Google Scholar 

  17. Martin, L. Introduction to identity based encryption, information security and privacy series. Artech House.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Karale, A., Poulkov, V., Lazarova, M., Koleva, P. (2021). Boneh-Boyen IBE. In: Ahmad, K.A.B., Ahmad, K., Dulhare, U.N. (eds) Functional Encryption. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-60890-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-60890-3_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-60889-7

  • Online ISBN: 978-3-030-60890-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics