Paper 2025/341
CCA-Secure Traceable Threshold (ID-based) Encryption and Application
Abstract
A recent work by Boneh, Partap, and Rotem [Crypto'24] introduced the concept of traceable threshold encryption, in that if $t$ or more parties collude to construct a decryption box, which performs decryptions, then at least one party's identity can be traced by making a few black-box queries to the box. This has important applications, e.g., in blockchain mempool privacy, where collusion yields high financial gain through MEVs without any consequence - the possibility of tracing discourages collusion. Nevertheless, their definitions leave room for exploitation as they only achieve CPA security and do not consider inconsistency in decryption via different participating sets. This paper proposes stronger definitions of traceable threshold encryption, which supports CCA-security and consistency. Our main approach considers identity-based variants of traceable encryption (which we also define). It converts that to a CCA-secure construction, adapting two generic transformations, first using a one-time signature and then a fingerprinting code. We put forward two efficient instantiations of our identity-based scheme with different merits: our first construction is based on Boneh-Franklin IBE [Crypto'01] and has constant size ciphertexts but quadratic size public keys - this is proven secure based on XDH and BDDH. Our second construction is based on Boneh-Boyen IBE [Eurocrypt'04]. It supports both constant-size ciphertexts and constant-size public keys - this is proven secure based on a variant of the uber assumption over bilinear pairings. Our concrete analysis shows that the first construction's ciphertext is much (~6x) smaller than the second construction. Finally, we extend the definitions to support consistency and achieve it by adjoining an efficient, non-interactive proof of correct encryption.
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Preprint.
- Keywords
- traceabilityCCA securitythreshold encryptionmevidentity based encryption
- Contact author(s)
-
rishiraj bhattacharyya @ gmail com
jan bormet @ tu-darmstadt de
sebastian faust @ tu-darmstadt de
pratyay85 @ gmail com
hussien othman @ gmail com - History
- 2025-02-25: approved
- 2025-02-24: received
- See all versions
- Short URL
- https://ia.cr/2025/341
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/341, author = {Rishiraj Bhattacharyya and Jan Bormet and Sebastian Faust and Pratyay Mukherjee and Hussien Othman}, title = {{CCA}-Secure Traceable Threshold ({ID}-based) Encryption and Application}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/341}, year = {2025}, url = {https://eprint.iacr.org/2025/341} }