ACAC Seminar Abstract

ACAC Seminar Abstract

ACAC Seminars

ACAC Seminar Abstract

Identity Based Cryptographic Schemes without Random Oracles

Speaker: Udaya Parampalli
Date, Time: Wed, 31 Oct 2007 11:00

Identity or Identifier (ID) based cryptography is a fairly recent idea used to build public key infrastructure (PKI) for computer network applications. The main motivation is to avoid large infrastructure and associated costs of previous traditional public key methods, and to simplify the management. As the name suggests, in Identifier based systems, the public key can be constructed from information which represents identity such as email addresses. Hence this method minimizes the use of public directories.

While ID-based systems have lot of potential for minimizing cost, they retain two problems associated with earlier schemes: the first is private keys have to be sent by a key generator to users, raising a security issue in the transfer; the second is that if a key is compromised, we need a secure and efficient scheme for revoking it. The first problem of key escrow property of Identity based cryptography is the main impediment in its widespread usage in practice.

In this talk I talk about our recent experience in building secure Identity based signature primitives. The specific key escrow nature of Identity based cryptography, often demands strong assurances from security perspective. Most of the current schemes are proved in random oracle model and from security point of view it is often desired to have proofs in standard model or without the assumption of random oracles. I will discuss recent trends in this exciting area of research. I discuss two new signatures in standard model. Both the constructions are secure against the signature forgery attack in the adaptive identity notion of security and efficient, with a shorter public parameter compared to the existing schemes.

Back to the top of this page