ARIBC: Online Reporting Based on Identity-Based Cryptography
The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents. Unfortunately, people involved in such incidents, either as witnesses or victims, are...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-02-01
|
Series: | Future Internet |
Subjects: | |
Online Access: | https://www.mdpi.com/1999-5903/13/2/53 |
id |
doaj-cfed0dccc7f74e9a99cc3c7f60355c57 |
---|---|
record_format |
Article |
spelling |
doaj-cfed0dccc7f74e9a99cc3c7f60355c572021-02-22T00:00:58ZengMDPI AGFuture Internet1999-59032021-02-0113535310.3390/fi13020053ARIBC: Online Reporting Based on Identity-Based CryptographyAthanasios Goudosis0Sokratis Katsikas1Systems Security Laboratory, Dept. of Digital Systems, University of Piraeus, Piraeus 18534, GreeceDepartment of Information Security and Communication Technology, Norwegian University of Science and Technology, Gjøvik 2802, NorwayThe reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents. Unfortunately, people involved in such incidents, either as witnesses or victims, are often reluctant to report them when such reporting demands revealing the reporter’s true identity. In this paper, we propose an online reporting system that leverages Identity-Based Cryptography (IBC) and offers data authentication, data integrity, and data confidentiality services to both eponymous and anonymous users. The system, called ARIBC, is founded on a certificate-less, public-key, IBC infrastructure, implemented by employing the Sakai–Kasahara approach and by following the IEEE 1363.3-2013 standard. We develop a proof-of-concept implementation of the proposed scheme, and demonstrate its applicability in environments with constrained human, organizational and/or computational resources. The computational overheads imposed by the scheme are found to be well within the capabilities of modern fixed or mobile devices.https://www.mdpi.com/1999-5903/13/2/53anonymous reportingidentity-based cryptographySakai–Kasahara scheme |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Athanasios Goudosis Sokratis Katsikas |
spellingShingle |
Athanasios Goudosis Sokratis Katsikas ARIBC: Online Reporting Based on Identity-Based Cryptography Future Internet anonymous reporting identity-based cryptography Sakai–Kasahara scheme |
author_facet |
Athanasios Goudosis Sokratis Katsikas |
author_sort |
Athanasios Goudosis |
title |
ARIBC: Online Reporting Based on Identity-Based Cryptography |
title_short |
ARIBC: Online Reporting Based on Identity-Based Cryptography |
title_full |
ARIBC: Online Reporting Based on Identity-Based Cryptography |
title_fullStr |
ARIBC: Online Reporting Based on Identity-Based Cryptography |
title_full_unstemmed |
ARIBC: Online Reporting Based on Identity-Based Cryptography |
title_sort |
aribc: online reporting based on identity-based cryptography |
publisher |
MDPI AG |
series |
Future Internet |
issn |
1999-5903 |
publishDate |
2021-02-01 |
description |
The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents. Unfortunately, people involved in such incidents, either as witnesses or victims, are often reluctant to report them when such reporting demands revealing the reporter’s true identity. In this paper, we propose an online reporting system that leverages Identity-Based Cryptography (IBC) and offers data authentication, data integrity, and data confidentiality services to both eponymous and anonymous users. The system, called ARIBC, is founded on a certificate-less, public-key, IBC infrastructure, implemented by employing the Sakai–Kasahara approach and by following the IEEE 1363.3-2013 standard. We develop a proof-of-concept implementation of the proposed scheme, and demonstrate its applicability in environments with constrained human, organizational and/or computational resources. The computational overheads imposed by the scheme are found to be well within the capabilities of modern fixed or mobile devices. |
topic |
anonymous reporting identity-based cryptography Sakai–Kasahara scheme |
url |
https://www.mdpi.com/1999-5903/13/2/53 |
work_keys_str_mv |
AT athanasiosgoudosis aribconlinereportingbasedonidentitybasedcryptography AT sokratiskatsikas aribconlinereportingbasedonidentitybasedcryptography |
_version_ |
1724257172301283328 |