Sciweavers

IJISEC
2006

Escrow-free encryption supporting cryptographic workflow

13 years 11 months ago
Escrow-free encryption supporting cryptographic workflow
Since Boneh and Franklin published their seminal paper on identity based encryption (IBE) using the Weil pairing , there has been a great deal of interest in cryptographic primitives based on elliptic-curve pairings. One particularly interesting application has been to control access to data, via possibly complex policies. In this paper we continue the research in this vein. We present an encryption scheme such that the receiver of an encrypted message can only decrypt if it satisfies a particular policy chosen by the sender at the time of encryption. Unlike standard IBE, our encryption scheme is escrow free in that no key-issuing authority (or colluding set of key-issuing authorities) is able to decrypt ciphertexts itself. In addition we describe a security model for the scenario in question and provide proofs of security for our scheme (in the random oracle model). 1
Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Sma
Added 12 Dec 2010
Updated 12 Dec 2010
Type Journal
Year 2006
Where IJISEC
Authors Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Smart
Comments (0)