About the Key Escrow Properties of Identity Based Encryption Schemes

Ruxandra Olimid


IBE (Identity Based Encryption) represents a type of public key encryption that allows a party to encrypt a message using the recipient’s identity as public key. The private keys needed for decryption are generated and distributed to each party by a KGC (Key Generation Center). The existence of such an entity in an IBE scheme allows access to the encrypted information for other parties other than the intended recipient by construction: the KGC or any other entity that receives the cryptographic keys from the KGC may perform decryption. A system that permits other parties to have access to the private keys of the users is said to have key escrow abilities. The paper performs a brief analysis of the key escrow properties of IBE schemes and gives a practical example of communication protocol that improves the key escrow capabilities.


Identity Based Encryption, Key Escrow, Lawful Interception

Full Text:



M. Abe, M. Kanda "A Key Escrow Scheme with Time-Limited Monitoring for One-way Communication", The Computer Journal, 45(6), 2002, pp.661-671.

Au M.H., Liu J.K., Yuen T.H., Wong D.S. “Practical Hierarchical Identity Based

Encryption and Signature Schemes without Random Oracles”. IACR Cryptology

ePrint Archive 368, 2006.

D.Boneh, X. Boyen "Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles", Advances in Cryptology - EUROCRYPT 2004, pp.223-238.

Boneh D., Boyen X., Goh E. “Hierarchical Identity Based Encryption with Constant Size Ciphertext”, Eurocrypt 2005, LNCS vol.3494, Springer, 2005, pp.440-456.

D.Boneh, M. Franklin "Identity-Based Encryption from the Weil Pairing", Crypto 2001, pp.213-229.

R.Canetti, S.Halevi, J.Katz "A Forward-Secure Public Key Encryption Scheme", Advances in Cryptology - EUROCRYPT 2003, pp.255-271.

Gentry C., Silverberg A “Hierarchical ID-Based Cryptography”, Asyacrypt LNCS vol.2501, Springer, 2002, pp.548-566.

K.Han, C.Y.Yeun, T.Shon, J.Park, K.Kim "A scalable and effcient key escrow model for lawful interception of IDBC-based secure ommunication", Int. Journal of Communication Systems 24(4), 2011, pp.461-472.

R. Olimid “Using Identity Based Encryption as Key Escrow Systems”, Proceedings of the International Conference on Security for Information Technology and Communications – SECITC 2012, pp.99-106.

A. Shamir "Identity-Based Cryptosystems and Signature Schemes", Crypto 1984, pp.47-53.

B.Waters "Efficient Identity-Based Encryption Without Random Oracles", Advances in Cryptology - EUROCRYPT 2005, pp.114-127.


  • There are currently no refbacks.

Journal of Mobile, Embedded and Distributed Systems (JMEDS) ISSN: 2067 – 4074 (online)