ARIBC: Online Reporting Based on Identity-Based Cryptography

The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents. Unfortunately, people involved in such incidents, either as witnesses or victims, are...

Full description

Bibliographic Details
Main Authors: Athanasios Goudosis, Sokratis Katsikas
Format: Article
Language:English
Published: MDPI AG 2021-02-01
Series:Future Internet
Subjects:
Online Access:https://www.mdpi.com/1999-5903/13/2/53
id doaj-cfed0dccc7f74e9a99cc3c7f60355c57
record_format Article
spelling doaj-cfed0dccc7f74e9a99cc3c7f60355c572021-02-22T00:00:58ZengMDPI AGFuture Internet1999-59032021-02-0113535310.3390/fi13020053ARIBC: Online Reporting Based on Identity-Based CryptographyAthanasios Goudosis0Sokratis Katsikas1Systems Security Laboratory, Dept. of Digital Systems, University of Piraeus, Piraeus 18534, GreeceDepartment of Information Security and Communication Technology, Norwegian University of Science and Technology, Gjøvik 2802, NorwayThe reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents. Unfortunately, people involved in such incidents, either as witnesses or victims, are often reluctant to report them when such reporting demands revealing the reporter’s true identity. In this paper, we propose an online reporting system that leverages Identity-Based Cryptography (IBC) and offers data authentication, data integrity, and data confidentiality services to both eponymous and anonymous users. The system, called ARIBC, is founded on a certificate-less, public-key, IBC infrastructure, implemented by employing the Sakai–Kasahara approach and by following the IEEE 1363.3-2013 standard. We develop a proof-of-concept implementation of the proposed scheme, and demonstrate its applicability in environments with constrained human, organizational and/or computational resources. The computational overheads imposed by the scheme are found to be well within the capabilities of modern fixed or mobile devices.https://www.mdpi.com/1999-5903/13/2/53anonymous reportingidentity-based cryptographySakai–Kasahara scheme
collection DOAJ
language English
format Article
sources DOAJ
author Athanasios Goudosis
Sokratis Katsikas
spellingShingle Athanasios Goudosis
Sokratis Katsikas
ARIBC: Online Reporting Based on Identity-Based Cryptography
Future Internet
anonymous reporting
identity-based cryptography
Sakai–Kasahara scheme
author_facet Athanasios Goudosis
Sokratis Katsikas
author_sort Athanasios Goudosis
title ARIBC: Online Reporting Based on Identity-Based Cryptography
title_short ARIBC: Online Reporting Based on Identity-Based Cryptography
title_full ARIBC: Online Reporting Based on Identity-Based Cryptography
title_fullStr ARIBC: Online Reporting Based on Identity-Based Cryptography
title_full_unstemmed ARIBC: Online Reporting Based on Identity-Based Cryptography
title_sort aribc: online reporting based on identity-based cryptography
publisher MDPI AG
series Future Internet
issn 1999-5903
publishDate 2021-02-01
description The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents. Unfortunately, people involved in such incidents, either as witnesses or victims, are often reluctant to report them when such reporting demands revealing the reporter’s true identity. In this paper, we propose an online reporting system that leverages Identity-Based Cryptography (IBC) and offers data authentication, data integrity, and data confidentiality services to both eponymous and anonymous users. The system, called ARIBC, is founded on a certificate-less, public-key, IBC infrastructure, implemented by employing the Sakai–Kasahara approach and by following the IEEE 1363.3-2013 standard. We develop a proof-of-concept implementation of the proposed scheme, and demonstrate its applicability in environments with constrained human, organizational and/or computational resources. The computational overheads imposed by the scheme are found to be well within the capabilities of modern fixed or mobile devices.
topic anonymous reporting
identity-based cryptography
Sakai–Kasahara scheme
url https://www.mdpi.com/1999-5903/13/2/53
work_keys_str_mv AT athanasiosgoudosis aribconlinereportingbasedonidentitybasedcryptography
AT sokratiskatsikas aribconlinereportingbasedonidentitybasedcryptography
_version_ 1724257172301283328