Abstract
File transfer service demands that what users have to do is as little as possible and that no one can see the contents of a file except for a sender and a receiver of the file. In identity-based cryptography (IBC), one can use receiver’s identity (ID) as a public key. There is no need to maintain public key certificates and to communicate preliminarily to get public keys. However, in common identity-based encryption (IBE), the decryption right is concentrated on the Private Key Generator (PKG) which generates every user’s private key. Therefore, the PKG is asked for complete trust which is difficult to find in many realistic scenarios. In this paper, we propose an encryption scheme which encrypts a message doubly. By using our scheme, the decryption right is distributed to three servers, and the only receiver can decrypt ciphertext.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
The Transport Layer Security (TLS) Protocol Version 1.2, http://tools.ietf.org/html/rfc5246
PKCS #7: Cryptographic Message Syntax Version 1.5, http://tools.ietf.org/html/rfc2315
Kate, A., Goldberg, I.: Distributed Private-Key Generators for Identity-Based Cryptography. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 436–453. Springer, Heidelberg (2010)
An Introduction to Threshold Cryptography, ftp://ftp.rsasecurity.com/pub/cryptobytes/crypto2n3.pdf
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. SIAM Journal on Computing 32(3), 586–615 (2003)
Identity-Based Cryptography Standard (IBCS) #1: Supersingular Curve Implementations of the BF and BB1 Cryptosystems, http://tools.ietf.org/html/rfc5091
Fujisaki, E., Okamoto, T.: Secure Integration of Asymmetric and Symmetric Encryption Schemes. Journal of Cryptology 26, 80–101 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sato, M., Mohri, M., Doi, H., Shiraishi, Y. (2014). Doubly Encrypted Identity-Based Encryption for File Transfer Service. In: Park, J., Stojmenovic, I., Choi, M., Xhafa, F. (eds) Future Information Technology. Lecture Notes in Electrical Engineering, vol 276. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40861-8_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-40861-8_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40860-1
Online ISBN: 978-3-642-40861-8
eBook Packages: EngineeringEngineering (R0)