Improved Identity Based Encryption System (IIBES): A Mechanism for Eliminating the Key-Escrow Problem

Maitri Patel, Rajan Patel

Abstract


A revolutionary change to public-key cryptography can be considered as an Identity Based Cryptography (IBC) in which identity of the receiver is being used as a public key for encrypting a message and Key Generation Centre (KGC). IBC will generate and distribute the private key to each user to decrypt a message. The thought behind presenting the scheme was to improve and reduce the complexity of certificate and key management, but it also gives rise to key escrow problem, access to encrypted information to unauthorized users. The paper represents Improved Identity-Based Encryption Scheme (IIBES) for Domain Name System (DNS) security which provides confidentiality and authentication through modified identity based encryption and identity based digital signatures. The IIBES comprises key revocation mechanism for non-revoked users and also eliminates key escrow problem. Thus, the IIBES aids to implement the identity-based cryptography more safely in reality and protects DNS against cache poisoning, spoofing attack and masquerade attack.

 

Doi: 10.28991/esj-2021-01259

Full Text: PDF


Keywords


Key Escrow Problem; Identity Based Cryptography; Key Generation Centre; Key Revocation; Domain Name System.

References


Chetioui, Kaouthar, Ghizlane Orhanou, and Said El Hajji. “Encryption of Query in DNS Message.” International Journal of Security and Its Applications 9, no. 12 (December 31, 2015): 313–322. doi:10.14257/ijsia.2015.9.12.29.

Ganji, Hamid Reza, and Kiarash Aghakhani. “Provides a New Way to Enhance Security in the Linux Operating System.” Emerging Science Journal 2, no. 5 (November 4, 2018): 295. doi:10.28991/esj-2018-01153.

Ariyapperuma, Suranjith, and Chris J. Mitchell. “Security Vulnerabilities in DNS and DNSSEC.” The Second International Conference on Availability, Reliability and Security (ARES’07) (2007). doi:10.1109/ares.2007.139.

Hussain, Mohammed Abdulridha, Hai Jin, Zaid Alaa Hussien, Zaid Ameen Abduljabbar, Salah H. Abbdal, and Ayad Ibrahim. “DNS Protection Against Spoofing and Poisoning Attacks.” 2016 3rd International Conference on Information Science and Control Engineering (ICISCE) (July 2016). doi:10.1109/icisce.2016.279.

Tsai, Tung-Tso, Yuh-Min Tseng, and Tsu-Yang Wu. “RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBE.” Informatica 25, no. 2 (January 1, 2014): 299–326. doi:10.15388/informatica.2014.16.

Chen, Liqun, and John Malone-Lee. “Improved Identity-Based Signcryption.” Lecture Notes in Computer Science (2005): 362–379. doi:10.1007/978-3-540-30580-4_25.

Elashry, Ibrahim, Yi Mu, and Willy Susilo. “Identity-Based Mediated RSA Revisited.” 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (July 2013). doi:10.1109/trustcom.2013.88.

Lai, Jianchang, Yi Mu, Fuchun Guo, and Willy Susilo. “Improved Identity-Based Online/Offline Encryption.” Lecture Notes in Computer Science (2015): 160–173. doi:10.1007/978-3-319-19962-7_10.

Boneh, Dan, Xuhua Ding, and Gene Tsudik. "Identity-based mediated RSA." In 3rd Workshop on Information Security Application, Jeju Island, Korea, vol. 12. 2002.

Gagné, Martin. “Identity-Based Encryption.” Encyclopedia of Cryptography and Security (n.d.): 280–282. doi:10.1007/0-387-23483-7_193.

Hu, Ziyuan, Shengli Liu, Kefei Chen, and Joseph Liu. “Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption.” Cryptography 2, no. 4 (October 23, 2018): 33. doi:10.3390/cryptography2040033.

Waters, Brent. “Efficient Identity-Based Encryption without Random Oracles.” Advances in Cryptology – EUROCRYPT 2005 (2005): 114–127. doi:10.1007/11426639_7.

Kiltz, Eike, and Gregory Neven. 2008. Identity-based signatures. Vol. 2, chap. III in Cryptology and Information Security Series, by M. Joye and G. Neven, 31-44. IOS Press. doi:10.3233/978-1-58603-947-9-31.

Soujanya, M. A., and Lalitha L. A. “An Efficiently Subcontracted the Identity-Based Encryption for Revocation in Cloud Computing.” International Journal of Science and Research (IJSR) 5, no. 5 (May 5, 2015): 514–520. doi:10.21275/v5i5.nov163317.

Liu, Shengli, Yu Long, and Kefei Chen. “Key Updating Technique in Identity-Based Encryption.” Information Sciences 181, no. 11 (June 2011): 2436–2440. doi:10.1016/j.ins.2011.01.022.

Gupta, Swati, and Vipul Gupta. “Revocable Key Identity Based Cryptography without Key Escrow Problem.” 2016 International Conference on Computing, Communication and Automation (ICCCA) (April 2016). doi:10.1109/ccaa.2016.7813817.

Boldyreva, Alexandra, Vipul Goyal, and Virendra Kumar. “Identity-Based Encryption with Efficient Revocation.” Proceedings of the 15th ACM Conference on Computer and Communications Security - CCS ’08 (2008). doi:10.1145/1455770.1455823.

Yuen, Tsz Hon, Willy Susilo, and Yi Mu. “How to Construct Identity-Based Signatures without the Key Escrow Problem.” International Journal of Information Security 9, no. 4 (July 22, 2010): 297–311. doi:10.1007/s10207-010-0110-5.

Wei, Quanyun, Fang Qi, and Zhe Tang. “Remove Key Escrow from the BF and Gentry Identity-Based Encryption with Non-Interactive Key Generation.” Telecommunication Systems 69, no. 2 (May 14, 2018): 253–262. doi:10.1007/s11235-018-0461-1.

Yuen, Tsz Hon, Cong Zhang, Sherman S. M. Chow, and Joseph K. Liu. “Towards Anonymous Ciphertext Indistinguishability with Identity Leakage.” Lecture Notes in Computer Science (2013): 139–153. doi:10.1007/978-3-642-41227-1_8.

Lee, B., C. Boyd, E. Dawson, K. Kim, J. Yang and Seungjae Yoo. “Secure Key Issuing in ID-based Cryptography.” ACSW (2004).

Seo, Jae Hong, and Keita Emura. “Revocable Identity-Based Encryption Revisited: Security Model and Construction.” Lecture Notes in Computer Science (2013): 216–234. doi:10.1007/978-3-642-36362-7_14.

Alapati, Kalyan Koushik. “Group-oriented secret sharing using Shamir's algorithm.” (2018). doi:10.7282/T3K077G6.

Shamir, Adi. “How to Share a Secret.” Communications of the ACM 22, no. 11 (November 1979): 612–613. doi:10.1145/359168.359176.

Shamir, Adi. “Identity-Based Cryptosystems and Signature Schemes.” Lecture Notes in Computer Science (November 2000): 47–53. doi:10.1007/3-540-39568-7_5.


Full Text: PDF

DOI: 10.28991/esj-2021-01259

Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 Maitri Patel, Dr. Rajan Patel