Abstract
Certificateless public key cryptography was introduced to solve the key escrow problem in identity based cryptography without using public key certificates. In this paper, we investigate certificateless encryption (CLE) scheme whose security does not rely on random oracles. We present a practical CLE scheme which is proved CCA2 secure in the standard model. Our scheme can be regarded as a modification to Zhang et al.’s scheme [5] which has been confirmed insecure against type II adversaries. The newly proposed CLE scheme not only overcomes the security drawbacks of Zhang et al.’s scheme, but also preserves its most distinctive feature of a short public key length. The formal security proof shows that the new scheme is IND-CCA2 secure against Type I and Type II attackers without random oracle under the decisional truncated q-ABDHE assumption and the DBDH assumption, respectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Al-Riyami, S., Paterson, K.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)
Au, M., Chen, J., Liu, J., Mu, Y., Wong, D., Yang, G.: Malicious KGC Attacks in Certificateless Cryptography. In: Proc. ASIACCS 2007, pp. 302–311. ACM press (2007)
Hwang, Y., Liu, J.: Certificateless public key encryption secure against malicious KGC attacks in the standard model. Journal of Universal Computer Science 463–480 (2008)
Zhang, G., Wang, X.: Certificateless Encryption Scheme Secure in Standard Model. Tsinghua Science and Technology 452-459 (2009)
Shen, L., Zhang, F., Li, S.: Cryptanalysis of a Certificateless Encryption Scheme in the Standard Model. In: 4th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012 (2012)
Dent, A.: A Survey of Certificateless Encryption Schemes and Security Models. Cryptology ePrint Archive, Report 2006/211 (2006)
Dent, A.W., Libert, B., Paterson, K.G.: Certificateless Encryption Schemes Strongly Secure in the Standard Model. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 344–359. Springer, Heidelberg (2008)
Al-Riyami, S., Paterson, K.: CBE from CL-PKE: A Generic Construction and Efficient Schemes. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 398–415. Springer, Heidelberg (2005)
Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless Public Key Encryption Without Pairing. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 134–148. Springer, Heidelberg (2005)
Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.: Generic construction of identity-based and certificateless KEMs. Cryptology ePrint Archive, Report 2005/058 (2005), http://eprint.iacr.org/2005/058
Cheng, Z., Comley, R.: Efficient Certificateless Public Key Encryption. Cryptology ePrint Archive, Report 2005/012 (2005), http://eprint.iacr.org/2005/012
Huang, X., Susilo, W., Mu, Y., Zhang, F.T.: On the Security of Certificateless Signature Schemes from Asiacrypt 2003. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 13–25. Springer, Heidelberg (2005)
Waters, B.: Efficient Identity-Based Encryption Without Random Oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005)
Libert, B., Quisquater, J.-J.: On Constructing Certificateless Cryptosystems from Identity Based Encryption. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 474–490. Springer, Heidelberg (2006)
Huang, Q., Wong, D.S.: Generic Certificateless Encryption in the Standard Model. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol. 4752, pp. 278–291. Springer, Heidelberg (2007)
Huang, Q., Wong, D.: Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model. Journal of Computer Seience and Technology, 807–826 (2010)
Gentry, C.: Practical Identity-Based Encryption Without Random Oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445–464. Springer, Heidelberg (2006)
Bellare, M., Shoup, S.: Two-tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir without Random Oracles. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 201–216. Springer, Heidelberg (2007)
Yum, D., Lee, P.: Generic Construction of Certificateless Signature. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 200–211. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, W., Zhang, F., Shen, L. (2012). Practical Certificateless Public Key Encryption in the Standard Model. In: Xu, L., Bertino, E., Mu, Y. (eds) Network and System Security. NSS 2012. Lecture Notes in Computer Science, vol 7645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34601-9_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-34601-9_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34600-2
Online ISBN: 978-3-642-34601-9
eBook Packages: Computer ScienceComputer Science (R0)