Identity-Based Cryptography: Schemes and Implementations
Uloženo v:
| Název: | Identity-Based Cryptography: Schemes and Implementations |
|---|---|
| Autoři: | Pedro F. Albanese, orcid:0009-0003-3163- |
| Informace o vydavateli: | Zenodo |
| Rok vydání: | 2025 |
| Sbírka: | Zenodo |
| Témata: | Identity-Based Encryption, Identity-Based Signatures, Zero-Knowledge Proofs, Bilinear Pairings, Threshold Cryptography, BLS12-381, Fujisaki-Okamoto Transform, Privacy-Preserving Authentication |
| Popis: | This comprehensive paper presents a thorough analysis of Identity-Based Cryptography (IBC), focusing on both encryption (IBE) and signature (IBS) schemes, along with novel contributions in threshold implementations and zero-knowledge proofs. We provide detailed mathematical formulations and practical implementations of major IBE schemes including Boneh-Franklin, Boneh-Boyen, and Sakai-Kasahara, all enhanced with Fujisaki-Okamoto transformations for achieving IND-CCA2 security. For IBS systems, we examine Barreto, Cha-Cheon, Galindo-Garcia, Hess, and ShangMi schemes, demonstrating their EUF-CMA security properties. A significant contribution of this work is the development of novel non-interactive zero-knowledge proofs (ZKPs) tailored for identity-based systems. We introduce two distinct ZKP constructions: a generalized approach for IBE/IBS systems based on Schnorr-type proofs adapted for bilinear pairings, and a specialized ZKP for the ShangMi/Barreto scheme offering alternative security properties. These ZKPs enable efficient verification of private key knowledge without disclosure, leveraging the Fiat-Shamir heuristic for non-interactive operation. Furthermore, we present a practical threshold IBE/IBS implementation that distributes the Private Key Generator (PKG) functionality across multiple servers using Shamir's Secret Sharing. This enhancement mitigates single points of failure and strengthens resilience against key compromise while maintaining compatibility with existing identity-based cryptographic primitives. All schemes are implemented using the BLS12-381 elliptic curve and are accompanied by complete mathematical correctness proofs. The implementations are publicly available through Go Playground links, providing practical reference implementations for researchers and practitioners. This work bridges theoretical cryptography with practical implementation, offering valuable insights for privacy-preserving authentication systems, decentralized identity management, and secure delegation protocols in ... |
| Druh dokumentu: | text |
| Jazyk: | unknown |
| Relation: | https://zenodo.org/records/17268423; oai:zenodo.org:17268423; https://doi.org/10.5281/zenodo.17268423 |
| DOI: | 10.5281/zenodo.17268423 |
| Dostupnost: | https://doi.org/10.5281/zenodo.17268423 https://zenodo.org/records/17268423 |
| Rights: | Creative Commons Attribution 4.0 International ; cc-by-4.0 ; https://creativecommons.org/licenses/by/4.0/legalcode ; Copyright (C) 2024 Pedro F. Albanese |
| Přístupové číslo: | edsbas.3B71567A |
| Databáze: | BASE |
| Abstrakt: | This comprehensive paper presents a thorough analysis of Identity-Based Cryptography (IBC), focusing on both encryption (IBE) and signature (IBS) schemes, along with novel contributions in threshold implementations and zero-knowledge proofs. We provide detailed mathematical formulations and practical implementations of major IBE schemes including Boneh-Franklin, Boneh-Boyen, and Sakai-Kasahara, all enhanced with Fujisaki-Okamoto transformations for achieving IND-CCA2 security. For IBS systems, we examine Barreto, Cha-Cheon, Galindo-Garcia, Hess, and ShangMi schemes, demonstrating their EUF-CMA security properties. A significant contribution of this work is the development of novel non-interactive zero-knowledge proofs (ZKPs) tailored for identity-based systems. We introduce two distinct ZKP constructions: a generalized approach for IBE/IBS systems based on Schnorr-type proofs adapted for bilinear pairings, and a specialized ZKP for the ShangMi/Barreto scheme offering alternative security properties. These ZKPs enable efficient verification of private key knowledge without disclosure, leveraging the Fiat-Shamir heuristic for non-interactive operation. Furthermore, we present a practical threshold IBE/IBS implementation that distributes the Private Key Generator (PKG) functionality across multiple servers using Shamir's Secret Sharing. This enhancement mitigates single points of failure and strengthens resilience against key compromise while maintaining compatibility with existing identity-based cryptographic primitives. All schemes are implemented using the BLS12-381 elliptic curve and are accompanied by complete mathematical correctness proofs. The implementations are publicly available through Go Playground links, providing practical reference implementations for researchers and practitioners. This work bridges theoretical cryptography with practical implementation, offering valuable insights for privacy-preserving authentication systems, decentralized identity management, and secure delegation protocols in ... |
|---|---|
| DOI: | 10.5281/zenodo.17268423 |
Nájsť tento článok vo Web of Science