Identity-Based Cryptography: Schemes and Implementations

Uloženo v:
Podrobná bibliografie
Název: Identity-Based Cryptography: Schemes and Implementations
Autoři: Pedro F. Albanese, orcid:0009-0003-3163-
Informace o vydavateli: Zenodo
Rok vydání: 2025
Sbírka: Zenodo
Témata: Identity-Based Encryption, Identity-Based Signatures, Zero-Knowledge Proofs, Bilinear Pairings, Threshold Cryptography, BLS12-381, Fujisaki-Okamoto Transform, Privacy-Preserving Authentication
Popis: This comprehensive paper presents a thorough analysis of Identity-Based Cryptography (IBC), focusing on both encryption (IBE) and signature (IBS) schemes, along with novel contributions in threshold implementations and zero-knowledge proofs. We provide detailed mathematical formulations and practical implementations of major IBE schemes including Boneh-Franklin, Boneh-Boyen, and Sakai-Kasahara, all enhanced with Fujisaki-Okamoto transformations for achieving IND-CCA2 security. For IBS systems, we examine Barreto, Cha-Cheon, Galindo-Garcia, Hess, and ShangMi schemes, demonstrating their EUF-CMA security properties. A significant contribution of this work is the development of novel non-interactive zero-knowledge proofs (ZKPs) tailored for identity-based systems. We introduce two distinct ZKP constructions: a generalized approach for IBE/IBS systems based on Schnorr-type proofs adapted for bilinear pairings, and a specialized ZKP for the ShangMi/Barreto scheme offering alternative security properties. These ZKPs enable efficient verification of private key knowledge without disclosure, leveraging the Fiat-Shamir heuristic for non-interactive operation. Furthermore, we present a practical threshold IBE/IBS implementation that distributes the Private Key Generator (PKG) functionality across multiple servers using Shamir's Secret Sharing. This enhancement mitigates single points of failure and strengthens resilience against key compromise while maintaining compatibility with existing identity-based cryptographic primitives. All schemes are implemented using the BLS12-381 elliptic curve and are accompanied by complete mathematical correctness proofs. The implementations are publicly available through Go Playground links, providing practical reference implementations for researchers and practitioners. This work bridges theoretical cryptography with practical implementation, offering valuable insights for privacy-preserving authentication systems, decentralized identity management, and secure delegation protocols in ...
Druh dokumentu: text
Jazyk: unknown
Relation: https://zenodo.org/records/17268423; oai:zenodo.org:17268423; https://doi.org/10.5281/zenodo.17268423
DOI: 10.5281/zenodo.17268423
Dostupnost: https://doi.org/10.5281/zenodo.17268423
https://zenodo.org/records/17268423
Rights: Creative Commons Attribution 4.0 International ; cc-by-4.0 ; https://creativecommons.org/licenses/by/4.0/legalcode ; Copyright (C) 2024 Pedro F. Albanese
Přístupové číslo: edsbas.3B71567A
Databáze: BASE
Popis
Abstrakt:This comprehensive paper presents a thorough analysis of Identity-Based Cryptography (IBC), focusing on both encryption (IBE) and signature (IBS) schemes, along with novel contributions in threshold implementations and zero-knowledge proofs. We provide detailed mathematical formulations and practical implementations of major IBE schemes including Boneh-Franklin, Boneh-Boyen, and Sakai-Kasahara, all enhanced with Fujisaki-Okamoto transformations for achieving IND-CCA2 security. For IBS systems, we examine Barreto, Cha-Cheon, Galindo-Garcia, Hess, and ShangMi schemes, demonstrating their EUF-CMA security properties. A significant contribution of this work is the development of novel non-interactive zero-knowledge proofs (ZKPs) tailored for identity-based systems. We introduce two distinct ZKP constructions: a generalized approach for IBE/IBS systems based on Schnorr-type proofs adapted for bilinear pairings, and a specialized ZKP for the ShangMi/Barreto scheme offering alternative security properties. These ZKPs enable efficient verification of private key knowledge without disclosure, leveraging the Fiat-Shamir heuristic for non-interactive operation. Furthermore, we present a practical threshold IBE/IBS implementation that distributes the Private Key Generator (PKG) functionality across multiple servers using Shamir's Secret Sharing. This enhancement mitigates single points of failure and strengthens resilience against key compromise while maintaining compatibility with existing identity-based cryptographic primitives. All schemes are implemented using the BLS12-381 elliptic curve and are accompanied by complete mathematical correctness proofs. The implementations are publicly available through Go Playground links, providing practical reference implementations for researchers and practitioners. This work bridges theoretical cryptography with practical implementation, offering valuable insights for privacy-preserving authentication systems, decentralized identity management, and secure delegation protocols in ...
DOI:10.5281/zenodo.17268423