Paper 2025/341

CCA-Secure Traceable Threshold (ID-based) Encryption and Application

Rishiraj Bhattacharyya, University of Birmingham
Jan Bormet, TU Darmstadt
Sebastian Faust, TU Darmstadt
Pratyay Mukherjee, Supra Research
Hussien Othman, TU Darmstadt
Abstract

A recent work by Boneh, Partap, and Rotem [Crypto'24] introduced the concept of traceable threshold encryption, in that if $t$ or more parties collude to construct a decryption box, which performs decryptions, then at least one party's identity can be traced by making a few black-box queries to the box. This has important applications, e.g., in blockchain mempool privacy, where collusion yields high financial gain through MEVs without any consequence - the possibility of tracing discourages collusion. Nevertheless, their definitions leave room for exploitation as they only achieve CPA security and do not consider inconsistency in decryption via different participating sets. This paper proposes stronger definitions of traceable threshold encryption, which supports CCA-security and consistency. Our main approach considers identity-based variants of traceable encryption (which we also define). It converts that to a CCA-secure construction, adapting two generic transformations, first using a one-time signature and then a fingerprinting code. We put forward two efficient instantiations of our identity-based scheme with different merits: our first construction is based on Boneh-Franklin IBE [Crypto'01] and has constant size ciphertexts but quadratic size public keys - this is proven secure based on XDH and BDDH. Our second construction is based on Boneh-Boyen IBE [Eurocrypt'04]. It supports both constant-size ciphertexts and constant-size public keys - this is proven secure based on a variant of the uber assumption over bilinear pairings. Our concrete analysis shows that the first construction's ciphertext is much (~6x) smaller than the second construction. Finally, we extend the definitions to support consistency and achieve it by adjoining an efficient, non-interactive proof of correct encryption.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
traceabilityCCA securitythreshold encryptionmevidentity based encryption
Contact author(s)
rishiraj bhattacharyya @ gmail com
jan bormet @ tu-darmstadt de
sebastian faust @ tu-darmstadt de
pratyay85 @ gmail com
hussien othman @ gmail com
History
2025-02-25: approved
2025-02-24: received
See all versions
Short URL
https://ia.cr/2025/341
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/341,
      author = {Rishiraj Bhattacharyya and Jan Bormet and Sebastian Faust and Pratyay Mukherjee and Hussien Othman},
      title = {{CCA}-Secure Traceable Threshold ({ID}-based) Encryption and Application},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/341},
      year = {2025},
      url = {https://eprint.iacr.org/2025/341}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.