Identity-Based Cryptography: Schemes and Implementations

Saved in:
Bibliographic Details
Title: Identity-Based Cryptography: Schemes and Implementations
Authors: Pedro F. Albanese, orcid:0009-0003-3163-
Publisher Information: Zenodo
Publication Year: 2025
Collection: Zenodo
Subject Terms: Identity-Based Encryption, Identity-Based Signatures, Zero-Knowledge Proofs, Bilinear Pairings, Threshold Cryptography, BLS12-381, Fujisaki-Okamoto Transform, Privacy-Preserving Authentication
Description: This comprehensive paper presents a thorough analysis of Identity-Based Cryptography (IBC), focusing on both encryption (IBE) and signature (IBS) schemes, along with novel contributions in threshold implementations and zero-knowledge proofs. We provide detailed mathematical formulations and practical implementations of major IBE schemes including Boneh-Franklin, Boneh-Boyen, and Sakai-Kasahara, all enhanced with Fujisaki-Okamoto transformations for achieving IND-CCA2 security. For IBS systems, we examine Barreto, Cha-Cheon, Galindo-Garcia, Hess, and ShangMi schemes, demonstrating their EUF-CMA security properties. A significant contribution of this work is the development of novel non-interactive zero-knowledge proofs (ZKPs) tailored for identity-based systems. We introduce two distinct ZKP constructions: a generalized approach for IBE/IBS systems based on Schnorr-type proofs adapted for bilinear pairings, and a specialized ZKP for the ShangMi/Barreto scheme offering alternative security properties. These ZKPs enable efficient verification of private key knowledge without disclosure, leveraging the Fiat-Shamir heuristic for non-interactive operation. Furthermore, we present a practical threshold IBE/IBS implementation that distributes the Private Key Generator (PKG) functionality across multiple servers using Shamir's Secret Sharing. This enhancement mitigates single points of failure and strengthens resilience against key compromise while maintaining compatibility with existing identity-based cryptographic primitives. All schemes are implemented using the BLS12-381 elliptic curve and are accompanied by complete mathematical correctness proofs. The implementations are publicly available through Go Playground links, providing practical reference implementations for researchers and practitioners. This work bridges theoretical cryptography with practical implementation, offering valuable insights for privacy-preserving authentication systems, decentralized identity management, and secure delegation protocols in ...
Document Type: text
Language: unknown
Relation: https://zenodo.org/records/17268423; oai:zenodo.org:17268423; https://doi.org/10.5281/zenodo.17268423
DOI: 10.5281/zenodo.17268423
Availability: https://doi.org/10.5281/zenodo.17268423
https://zenodo.org/records/17268423
Rights: Creative Commons Attribution 4.0 International ; cc-by-4.0 ; https://creativecommons.org/licenses/by/4.0/legalcode ; Copyright (C) 2024 Pedro F. Albanese
Accession Number: edsbas.3B71567A
Database: BASE
Description
Abstract:This comprehensive paper presents a thorough analysis of Identity-Based Cryptography (IBC), focusing on both encryption (IBE) and signature (IBS) schemes, along with novel contributions in threshold implementations and zero-knowledge proofs. We provide detailed mathematical formulations and practical implementations of major IBE schemes including Boneh-Franklin, Boneh-Boyen, and Sakai-Kasahara, all enhanced with Fujisaki-Okamoto transformations for achieving IND-CCA2 security. For IBS systems, we examine Barreto, Cha-Cheon, Galindo-Garcia, Hess, and ShangMi schemes, demonstrating their EUF-CMA security properties. A significant contribution of this work is the development of novel non-interactive zero-knowledge proofs (ZKPs) tailored for identity-based systems. We introduce two distinct ZKP constructions: a generalized approach for IBE/IBS systems based on Schnorr-type proofs adapted for bilinear pairings, and a specialized ZKP for the ShangMi/Barreto scheme offering alternative security properties. These ZKPs enable efficient verification of private key knowledge without disclosure, leveraging the Fiat-Shamir heuristic for non-interactive operation. Furthermore, we present a practical threshold IBE/IBS implementation that distributes the Private Key Generator (PKG) functionality across multiple servers using Shamir's Secret Sharing. This enhancement mitigates single points of failure and strengthens resilience against key compromise while maintaining compatibility with existing identity-based cryptographic primitives. All schemes are implemented using the BLS12-381 elliptic curve and are accompanied by complete mathematical correctness proofs. The implementations are publicly available through Go Playground links, providing practical reference implementations for researchers and practitioners. This work bridges theoretical cryptography with practical implementation, offering valuable insights for privacy-preserving authentication systems, decentralized identity management, and secure delegation protocols in ...
DOI:10.5281/zenodo.17268423