{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T05:06:34Z","timestamp":1764133594117,"version":"3.41.0"},"reference-count":39,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T00:00:00Z","timestamp":1678752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Shenzhen fundamental research","award":["20200925154814002"],"award-info":[{"award-number":["20200925154814002"]}]},{"name":"Guangdong Provincial Key Laboratory","award":["2020B121201001"],"award-info":[{"award-number":["2020B121201001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Distrib. Ledger Technol."],"published-print":{"date-parts":[[2023,9,30]]},"abstract":"<jats:p>\n            Garg et\u00a0al. (TCC 2018) defined the notion of registration-based encryption (RBE) where the private key generator (PKG) is decoupled from key management and replaced by a key curator (KC). KC does not possess any cryptographic secrets and only plays the role of aggregating the public keys of all the registered users and updating the public parameters whenever a new user joins the system, which solves the\n            <jats:italic>key escrow<\/jats:italic>\n            issue. Notwithstanding, RBE still places a significant amount of trust in KC, whose actions are not accountable, e.g., it could secretly register multiple keys for already registered users. In this article, we propose a blockchain-based RBE framework, which provides total transparency and decentralization of KC by leveraging smart contracts. Our framework transfers the right of key management from KC to individual participants and keeps publicly upgradable parameters on-chain. We provide a basic construction that calculates the public parameter on-chain and an extended construction with better efficiency, which merely calculates the roots of trees on-chain. Our basic version is theoretically feasible, while the extended version is practically feasible. In particular, the enhanced scheme reduces computing complexity to a constant level. Our prototype implementation and evaluation results demonstrate that our extended construction is satisfactorily efficient.\n          <\/jats:p>","DOI":"10.1145\/3568315","type":"journal-article","created":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T12:51:45Z","timestamp":1666183905000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Transparent Registration-Based Encryption through Blockchain"],"prefix":"10.1145","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2264-749X","authenticated-orcid":false,"given":"Qin","family":"Wang","sequence":"first","affiliation":[{"name":"CSIRO, Data61, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0276-5632","authenticated-orcid":false,"given":"Rujia","family":"Li","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology and University of Birmingham, Nanshan District, Shenzhen, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9780-5443","authenticated-orcid":false,"given":"Qi","family":"Wang","sequence":"additional","affiliation":[{"name":"Guangdong Provincial Key Laboratory of Brain-Inspired Intelligent Computation, Department of Computer Science and Engineering, Southern University of Science and Technology, Nanshan District, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3563-5551","authenticated-orcid":false,"given":"David","family":"Galindo","sequence":"additional","affiliation":[{"name":"University of Birmingham, Edgbaston, Birmingham, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4603-0024","authenticated-orcid":false,"given":"Shiping","family":"Chen","sequence":"additional","affiliation":[{"name":"CSIRO, Data61, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5252-0831","authenticated-orcid":false,"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Hawthorn, Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2023,3,14]]},"reference":[{"key":"e_1_3_2_2_2","first-page":"47","volume-title":"Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT)","author":"Shamir Adi","year":"1984","unstructured":"Adi Shamir. 1984. Identity-based cryptosystems and signature schemes. In Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT). Springer, 47\u201353."},{"key":"e_1_3_2_3_2","first-page":"223","volume-title":"International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT\u201904)","author":"Boneh Dan","year":"2004","unstructured":"Dan Boneh and Xavier Boyen. 2004. Efficient selective-ID secure identity-based encryption without random oracles. In International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT\u201904). Springer, 223\u2013238."},{"key":"e_1_3_2_4_2","first-page":"213","volume-title":"Annual Theory of Cryptography Conference (CRYPTO\u201901)","author":"Boneh Dan","year":"2001","unstructured":"Dan Boneh and Matt Franklin. 2001. Identity-based encryption from the Weil pairing. In Annual Theory of Cryptography Conference (CRYPTO\u201901), Joe Kilian (Ed.). Springer, 213\u2013229."},{"key":"e_1_3_2_5_2","first-page":"255","volume-title":"International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT\u201903)","author":"Canetti Ran","year":"2003","unstructured":"Ran Canetti, Shai Halevi, and Jonathan Katz. 2003. A forward-secure public-key encryption scheme. In International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT\u201903). Springer, 255\u2013271."},{"key":"e_1_3_2_6_2","first-page":"457","volume-title":"International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT\u201905)","author":"Sahai Amit","year":"2005","unstructured":"Amit Sahai and Brent Waters. 2005. Fuzzy identity-based encryption. In International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT\u201905), Ronald Cramer (Ed.). Springer, 457\u2013473."},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03807-6_25"},{"key":"e_1_3_2_8_2","first-page":"63","volume-title":"International Workshop on Public Key Cryptography (PKC)","author":"Garg Sanjam","year":"2019","unstructured":"Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi, and Sruthi Sekar. 2019. Registration-based encryption from standard assumptions. In International Workshop on Public Key Cryptography (PKC). Springer, 63\u201393."},{"key":"e_1_3_2_9_2","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. (2008). https:\/\/bitcoin.org\/bitcoin. Retrieved on Oct 25 2022."},{"issue":"2014","key":"e_1_3_2_10_2","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Wood Gavin","year":"2014","unstructured":"Gavin Wood et\u00a0al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151, 2014 (2014), 1\u201332.","journal-title":"Ethereum Project Yellow Paper"},{"key":"e_1_3_2_11_2","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1109\/SP.2017.57","volume-title":"2017 IEEE Symposium on Security and Privacy (S&P\u201917)","author":"Matsumoto Stephanos","year":"2017","unstructured":"Stephanos Matsumoto and Raphael M. Reischuk. 2017. IKP: Turning a PKI around with decentralized automated incentives. In 2017 IEEE Symposium on Security and Privacy (S&P\u201917). IEEE, 410\u2013426."},{"key":"e_1_3_2_12_2","first-page":"144","volume-title":"International Conference on Financial Cryptography and Data Security (FC\u201918)","author":"Wang Ze","year":"2018","unstructured":"Ze Wang, Jingqiang Lin, Quanwei Cai, Qiongxiao Wang, Jiwu Jing, and Daren Zha. 2018. Blockchain-based certificate transparency and revocation transparency. In International Conference on Financial Cryptography and Data Security (FC\u201918). Springer, 144\u2013162."},{"key":"e_1_3_2_13_2","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/978-3-662-53357-4_7","volume-title":"International Conference on Financial Cryptography and Data Security (FC\u201916)","author":"Bonneau Joseph","year":"2016","unstructured":"Joseph Bonneau. 2016. EthIKS: Using ethereum to audit a CONIKS key transparency log. In International Conference on Financial Cryptography and Data Security (FC\u201916). Springer, 95\u2013105."},{"key":"e_1_3_2_14_2","first-page":"316","volume-title":"Advances in Computer Science and Ubiquitous Computing (CSA-CUTE)","author":"Roh Chang-Hyun","year":"2018","unstructured":"Chang-Hyun Roh and Im-Yeong Lee. 2018. A study on PGP (pretty good privacy) using blockchain. In Advances in Computer Science and Ubiquitous Computing (CSA-CUTE). Springer, 316\u2013320."},{"key":"e_1_3_2_15_2","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1007\/978-3-319-25645-0_25","volume-title":"International Conference on Network and System Security (NSS\u201915)","author":"Wilson Duane","year":"2015","unstructured":"Duane Wilson and Giuseppe Ateniese. 2015. From pretty good to great: Enhancing PGP using bitcoin and the blockchain. In International Conference on Network and System Security (NSS\u201915). Springer, 368\u2013375."},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"e_1_3_2_17_2","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1109\/SP.2017.9","volume-title":"2017 IEEE Symposium on Security and Privacy (S&P\u201917)","author":"Gelernter Nethanel","year":"2017","unstructured":"Nethanel Gelernter, Senia Kalma, Bar Magnezi, and Hen Porcilan. 2017. The password reset MitM attack. In 2017 IEEE Symposium on Security and Privacy (S&P\u201917). IEEE, 251\u2013267."},{"key":"e_1_3_2_18_2","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1109\/DSN.2014.43","volume-title":"2014 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201914)","author":"Bessani Alysson","year":"2014","unstructured":"Alysson Bessani, Joao Sousa, and Eduardo E. P. Alchieri. 2014. State machine replication for the masses with BFT-SMART. In 2014 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201914). IEEE, 355\u2013362."},{"key":"e_1_3_2_19_2","first-page":"1","volume-title":"Annual International Cryptology Conference (CRYPTO\u201901)","author":"Barak Boaz","year":"2001","unstructured":"Boaz Barak, Oded Goldreich, Rusell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, and Ke Yang. 2001. On the (im) possibility of obfuscating programs. In Annual International Cryptology Conference (CRYPTO\u201901). Springer, 1\u201318."},{"key":"e_1_3_2_20_2","volume-title":"A Reference for Randomness Beacons: Format and Protocol Version 2","author":"Kelsey John","year":"2019","unstructured":"John Kelsey, Lu\u00eds T. A. N. Brand\u00e3o, Rene Peralta, and Harold Booth. 2019. A Reference for Randomness Beacons: Format and Protocol Version 2. Technical Report. National Institute of Standards and Technology."},{"key":"e_1_3_2_21_2","article-title":"Proofs-of-delay and randomness beacons in ethereum","author":"B\u00fcnz Benedikt","year":"2017","unstructured":"Benedikt B\u00fcnz, Steven Goldfeder, and Joseph Bonneau. 2017. Proofs-of-delay and randomness beacons in ethereum. IEEE Security and Privacy on the Blockchain (S&B) (2017).","journal-title":"IEEE Security and Privacy on the Blockchain (S&B)"},{"key":"e_1_3_2_22_2","first-page":"26","volume-title":"Annual International Cryptology Conference (CRYPTO\u201998)","author":"Bellare Mihir","year":"1998","unstructured":"Mihir Bellare, Anand Desai, David Pointcheval, and Phillip Rogaway. 1998. Relations among notions of security for public-key encryption schemes. In Annual International Cryptology Conference (CRYPTO\u201998). Springer, 26\u201345."},{"key":"e_1_3_2_23_2","volume-title":"Network and Distributed System Security Symposium (NDSS\u201914)","author":"Ryan Mark D.","year":"2014","unstructured":"Mark D. Ryan. 2014. Enhanced certificate transparency and end-to-end encrypted mail. In Network and Distributed System Security Symposium (NDSS\u201914)."},{"key":"e_1_3_2_24_2","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1109\/EuroSP.2019.00023","volume-title":"2019 IEEE European Symposium on Security and Privacy (EuroS&P\u201919)","author":"Cheng Raymond","year":"2019","unstructured":"Raymond Cheng, Fan Zhang, Jernej Kos, Warren He, Nicholas Hynes, Noah Johnson, Ari Juels, Andrew Miller, and Dawn Song. 2019. Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts. In 2019 IEEE European Symposium on Security and Privacy (EuroS&P\u201919). IEEE, 185\u2013200."},{"key":"e_1_3_2_25_2","first-page":"621","volume-title":"Annual International Cryptology Conference (CRYPTO\u201920)","author":"Goyal Rishab","year":"2020","unstructured":"Rishab Goyal and Satyanarayana Vusirikala. 2020. Verifiable registration-based encryption. In Annual International Cryptology Conference (CRYPTO\u201920). Springer, 621\u2013651."},{"key":"e_1_3_2_26_2","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1016\/j.future.2017.08.025","article-title":"Cecoin: A decentralized PKI mitigating MitM attacks","volume":"107","author":"Shi Bo Qin, Jikun Huang, Qin Wang, Xizhao Luo, Bin Liang, and Wenchang","year":"2020","unstructured":"Bo Qin, Jikun Huang, Qin Wang, Xizhao Luo, Bin Liang, and Wenchang Shi. 2020. Cecoin: A decentralized PKI mitigating MitM attacks. Future Generation Computer Systems (FGCS) 107 (2020), 805\u2013815.","journal-title":"Future Generation Computer Systems (FGCS)"},{"key":"e_1_3_2_27_2","first-page":"299","volume-title":"International Conference on Cryptology and Network Security (CANS\u201917)","author":"Patsonakis Christos","year":"2017","unstructured":"Christos Patsonakis, Katerina Samari, Mema Roussopoulos, and Aggelos Kiayias. 2017. Towards a smart contract-based, decentralized, public-key infrastructure. In International Conference on Cryptology and Network Security (CANS\u201917). Springer, 299\u2013321."},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.05.013"},{"key":"e_1_3_2_29_2","article-title":"Blockchain-based certificate transparency and revocation transparency","author":"Wang Ze","year":"2020","unstructured":"Ze Wang, Jingqiang Lin, Quanwei Cai, Qiongxiao Wang, Daren Zha, and Jiwu Jing. 2020. Blockchain-based certificate transparency and revocation transparency. IEEE Transactions on Dependable and Secure Computing (TDSC), 19 (2020), 681\u2013697.","journal-title":"IEEE Transactions on Dependable and Secure Computing (TDSC)"},{"key":"e_1_3_2_30_2","first-page":"1","volume-title":"Proceedings of the 7th International Conference on the Internet of Things","author":"Durand Arnaud","year":"2017","unstructured":"Arnaud Durand, Pascal Gremaud, and Jacques Pasquier. 2017. Decentralized web of trust and authentication for the internet of things. In Proceedings of the 7th International Conference on the Internet of Things. 1\u20132."},{"key":"e_1_3_2_31_2","first-page":"181","volume-title":"2016 USENIX Annual Technical Conference (USENIX ATC\u201916)","author":"Ali Muneeb","year":"2016","unstructured":"Muneeb Ali, Jude Nelson, Ryan Shea, and Michael J. Freedman. 2016. Blockstack: A global naming and storage system secured by blockchains. In 2016 USENIX Annual Technical Conference (USENIX ATC\u201916). 181\u2013194."},{"key":"e_1_3_2_32_2","first-page":"226","volume-title":"2018 14th International Conference on Network and Service Management (CNSM\u201918)","author":"Dong Yuhao","year":"2018","unstructured":"Yuhao Dong, Woojung Kim, and Raouf Boutaba. 2018. Bitforest: A portable and efficient blockchain-based naming system. In 2018 14th International Conference on Network and Service Management (CNSM\u201918). IEEE, 226\u2013232."},{"issue":"4","key":"e_1_3_2_33_2","first-page":"1735","article-title":"Blockchain technology the identity management and authentication service disruptor: A survey","volume":"8","author":"Lim Shu Yun","year":"2018","unstructured":"Shu Yun Lim, Pascal Tankam Fotsing, Abdullah Almasri, Omar Musa, Miss Laiha Mat Kiah, Tan Fong Ang, and Reza Ismail. 2018. Blockchain technology the identity management and authentication service disruptor: A survey. International Journal on Advanced Science, Engineering and Information Technology (IJASEIT) 8, 4-2 (2018), 1735\u20131745.","journal-title":"International Journal on Advanced Science, Engineering and Information Technology (IJASEIT)"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3111247"},{"key":"e_1_3_2_35_2","first-page":"44","volume-title":"2017 15th Annual Conference on Privacy, Security and Trust (PST\u201917)","author":"Liu Yuan","year":"2017","unstructured":"Yuan Liu, Zheng Zhao, Guibing Guo, Xingwei Wang, Zhenhua Tan, and Shuang Wang. 2017. An identity management system based on blockchain. In 2017 15th Annual Conference on Privacy, Security and Trust (PST\u201917). IEEE, 44\u20134409."},{"key":"e_1_3_2_36_2","article-title":"Poster: Transparent certificate revocation for CBE based on blockchain","author":"Wang Qin","year":"2020","unstructured":"Qin Wang, Rujia Li, Qi Wang, and David Galindo. 2020. Poster: Transparent certificate revocation for CBE based on blockchain. Poster Session of 41st IEEE Symposium on Security and Privacy (S&P).","journal-title":"Poster Session of 41st IEEE Symposium on Security and Privacy (S&P)"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.101636"},{"key":"e_1_3_2_38_2","article-title":"How do smart contracts benefit security protocols?","author":"Li Rujia","year":"2022","unstructured":"Rujia Li, Qin Wang, Qi Wang, and David Galindo. 2022. How do smart contracts benefit security protocols?arXiv:2202.08699. https:\/\/arxiv.org\/pdf\/2202.08699.pdf.","journal-title":"arXiv:2202.08699"},{"key":"e_1_3_2_39_2","first-page":"79","volume-title":"Companion Proceedings of the The Web Conference (WWW\u201918)","author":"Nguyen Hoang-Long","year":"2018","unstructured":"Hoang-Long Nguyen, Claudia-Lavinia Ignat, and Olivier Perrin. 2018. Trusternity: Auditing transparent log server with blockchain. In Companion Proceedings of the The Web Conference (WWW\u201918). 79\u201380."},{"key":"e_1_3_2_40_2","unstructured":"Accessible at https:\/\/docs.ens.domains\/ 2022 Ethereum name service"}],"container-title":["Distributed Ledger Technologies: Research and Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568315","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3568315","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:33Z","timestamp":1750182693000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568315"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,14]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,9,30]]}},"alternative-id":["10.1145\/3568315"],"URL":"https:\/\/doi.org\/10.1145\/3568315","relation":{},"ISSN":["2769-6472","2769-6480"],"issn-type":[{"type":"print","value":"2769-6472"},{"type":"electronic","value":"2769-6480"}],"subject":[],"published":{"date-parts":[[2023,3,14]]},"assertion":[{"value":"2022-02-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-09-23","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}