Skip to main content
placeholder image

How to construct identity-based signatures without the key escrow problem

Chapter


Abstract


  • The inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing solution for mitigating the key escrow problem is by adopting multiple Private Key Generators (PKGs). Recently, there was a proposal that attempted to reduce the trust of the PKG by allowing a malicious PKG to be caught if he reveals the user's identity-based secret key illegally. Nonetheless, the proposal does not consider that the PKG can simply decrypt the ciphertext instead of revealing the secret key itself (in the case of identity-based encryption schemes). The aim of this paper is to present an escrow-free identity-based signature (IBS) scheme, in which the malicious PKG will be caught if it releases a signature on behalf of the user but signed by itself. We present a formal model to capture such a scheme and provide a concrete construction. © 2010 Springer-Verlag.

Publication Date


  • 2010

Citation


  • Yuen, T. H., Susilo, W., & Mu, Y. (2010). How to construct identity-based signatures without the key escrow problem. In Unknown Book (Vol. 6391 LNCS, pp. 286-301). doi:10.1007/978-3-642-16441-5_19

International Standard Book Number (isbn) 13


  • 9783642164408

Scopus Eid


  • 2-s2.0-78449238285

Book Title


  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Start Page


  • 286

End Page


  • 301

Abstract


  • The inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing solution for mitigating the key escrow problem is by adopting multiple Private Key Generators (PKGs). Recently, there was a proposal that attempted to reduce the trust of the PKG by allowing a malicious PKG to be caught if he reveals the user's identity-based secret key illegally. Nonetheless, the proposal does not consider that the PKG can simply decrypt the ciphertext instead of revealing the secret key itself (in the case of identity-based encryption schemes). The aim of this paper is to present an escrow-free identity-based signature (IBS) scheme, in which the malicious PKG will be caught if it releases a signature on behalf of the user but signed by itself. We present a formal model to capture such a scheme and provide a concrete construction. © 2010 Springer-Verlag.

Publication Date


  • 2010

Citation


  • Yuen, T. H., Susilo, W., & Mu, Y. (2010). How to construct identity-based signatures without the key escrow problem. In Unknown Book (Vol. 6391 LNCS, pp. 286-301). doi:10.1007/978-3-642-16441-5_19

International Standard Book Number (isbn) 13


  • 9783642164408

Scopus Eid


  • 2-s2.0-78449238285

Book Title


  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Start Page


  • 286

End Page


  • 301