Verifiable Registration-Based Encryption

被引:23
|
作者
Goyal, Rishab [1 ]
Vusirikala, Satyanarayana [2 ]
机构
[1] MIT, Cambridge, MA 02139 USA
[2] UT Austin, Austin, TX 78712 USA
来源
关键词
D O I
10.1007/978-3-030-56784-2_21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent work, Garg, Hajiabadi, Mahmoody, and Rahimi [18] introduced a new encryption framework, which they referred to as Registration-Based Encryption (RBE). The central motivation behind RBE was to provide a novel methodology for solving the well-known key-escrow problem in Identity-Based Encryption (IBE) systems [33]. Informally, in an RBE system, there is no private-key generator unlike IBE systems, but instead, it is replaced with a public key accumulator. Every user in an RBE system samples its own public-secret key pair and sends the public key to the accumulator for registration. The key accumulator has no secret state and is only responsible for compressing all the registered user identity-key pairs into a short public commitment. Here the encryptor only requires the compressed parameters along with the target identity, whereas a decryptor requires supplementary key material along with the secret key associated with the registered public key. The initial construction in [18] based on standard assumptions only provided weak efficiency properties. In a follow-up work by Garg, Hajiabadi, Mahmoody, Rahimi, and Sekar [19], they gave an efficient RBE construction from standard assumptions. However, both these works considered the key accumulator to be honest which might be too strong an assumption in real-world scenarios. In this work, we initiate a formal study of RBE systems with malicious key accumulators. To that end, we introduce a strengthening of the RBE framework which we call Verifiable RBE (VRBE). A VRBE system additionally gives the users an extra capability to obtain short proofs from the key accumulator proving correct (and unique) registration for every registered user as well as proving non-registration for any yet unregistered identity. We construct VRBE systems that provide succinct proofs of registration and non-registration from standard assumptions (such as CDH, Factoring, LWE). Our proof systems also naturally allow a much more efficient audit process which can be performed by any non-participating third party as well. A by-product of our approach is that we provide a more efficient RBE construction than that provided in the prior work of Garg et al. [19]. And lastly, we initiate a study on the extension of VRBE to a wider range of access and trust structures.
引用
收藏
页码:621 / 651
页数:31
相关论文
共 50 条
  • [21] Registration-based initialization during radiation therapy planning
    Gopalakrishnan, Girish
    Mullick, Rakesh
    MEDICAL IMAGING 2007: IMAGE PROCESSING, PTS 1-3, 2007, 6512
  • [22] Assessment of a registration-based measure of grey matter atrophy
    Anderson, V.
    Fisniku, L.
    Hobbs, N.
    Miller, D.
    MULTIPLE SCLEROSIS, 2009, 15 (09): : S106 - S106
  • [23] A new method for registration-based medical image interpolation
    Frakes, David H.
    Dasi, Lakshmi P.
    Pekkan, Kerem
    Kitajima, Hiroumi D.
    Sundareswaran, Kartik
    Yoganathan, Ajit P.
    Smith, Mark J. T.
    IEEE TRANSACTIONS ON MEDICAL IMAGING, 2008, 27 (03) : 370 - 377
  • [24] Verifiable Functional Encryption
    Badrinarayanan, Saikrishna
    Goyal, Vipul
    Jain, Aayush
    Sahai, Amit
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 557 - 587
  • [25] Identity-Based Encryption with Verifiable Outsourced Revocation
    Ren, Yanli
    Ding, Ning
    Zhang, Xinpeng
    Lu, Haining
    Gu, Dawu
    COMPUTER JOURNAL, 2016, 59 (11): : 1659 - 1668
  • [26] Fair Verifiable Search Encryption Scheme Based on Blockchain
    Li, Yang
    Wang, Jingyu
    Liu, Lixin
    Computer Engineering and Applications, 2024, 60 (06) : 301 - 311
  • [27] Attribute-Based Encryption With Verifiable Outsourced Decryption
    Lai, Junzuo
    Deng, Robert H.
    Guan, Chaowen
    Weng, Jian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (08) : 1343 - 1354
  • [28] Security Verification of an Authentication Algorithm Based on Verifiable Encryption
    Kihara, Maki
    Iriyama, Satoshi
    INFORMATION, 2023, 14 (02)
  • [29] Verifiable Dynamic Searchable Symmetric Encryption Based on Blockchain
    Xu W.-S.
    Zhang J.-B.
    Yuan Y.-L.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (11): : 5392 - 5407
  • [30] Verifiable quantum homomorphic encryption based on garbled evaluation
    He, Renke
    Chen, Lingli
    Li, Qin
    Tan, Xiaoqing
    Chen, Lv
    QUANTUM SCIENCE AND TECHNOLOGY, 2024, 9 (04):