[Resource Topic] 2004/258: Escrow-Free Encryption Supporting Cryptographic Workflow

Welcome to the resource topic for 2004/258

Escrow-Free Encryption Supporting Cryptographic Workflow

Authors: S. S. Al-Riyami, J. Malone-Lee, N. P. Smart


Since Boneh and Franklin published their seminal paper on identity
based encryption (IBE) using the Weil pairing , there has been a great
deal of interest in cryptographic primitives based on elliptic-curve pairings.
One particularly interesting application has been to control access to
data, via possibly complex policies.
In this paper we continue the research in this vein. We present an
encryption scheme such that the receiver of an encrypted message can
only decrypt if it satisfies a particular policy chosen by
the sender at the time of encryption.
Unlike standard IBE, our encryption scheme is escrow free in that no
key-issuing authority (or colluding set of key-issuing authorities) is
able to decrypt ciphertexts itself.
In addition we describe a security model for the scenario in question
and provide proofs of security for our scheme (in the random oracle model).

ePrint: https://eprint.iacr.org/2004/258

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .