Skip to main content
Log in

A survey of certificateless encryption schemes and security models

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

This paper surveys the literature on certificateless encryption schemes. In particular, we examine the large number of security models that have been proposed to prove the security of certificateless encryption schemes and propose a new nomenclature for these models. This allows us to “rank” the notions of security for a certificateless encryption scheme against an outside attacker and a passive key generation centre, and we suggest which of these notions should be regarded as the “correct” model for a secure certificateless encryption scheme. We also examine the security models that aim to provide security against an actively malicious key generation centre and against an outside attacker who attempts to deceive a legitimate sender into using an incorrect public key (with the intention to deny the legitimate receiver that ability to decrypt the ciphertext). We note that the existing malicious key generation centre model fails to capture realistic attacks that a malicious key generation centre might make and propose a new model. Lastly, we survey the existing certificateless encryption schemes and compare their security proofs. We show that few schemes provide the “correct” notion of security without appealing to the random oracle model. The few schemes that do provide sufficient security guarantees are comparatively inefficient. Hence, we conclude that more research is needed before certificateless encryption schemes can be thought to be a practical technology.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Abe, M., Gennaro, R., Karosawa, K., Shoup, V.: Tag-KEM/DEM: A new framework for hybrid encryption. In: Cramer, R. (ed.) Advance in Cryptology – Eurocrypt 2005. Lecture Notes in Computer Science, vol. 3494, pp. 128–146. Springer, Heidelberg (2005)

  2. Al-Riyami, S.: Cryptographic schemes based on elliptic curve pairings. Ph.D. thesis, Royal Holloway, University of London (2004). http://www.isg.rhul.ac.uk/~kp/sattthesis.pdf

  3. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.S. (ed.) Advances in Cryptology—Asiacrypt 2003. Lecture Notes in Computer Science, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)

  4. Al-Riyami, S.S., Paterson, K.G.: CBE from CL-PKE: A generic construction and efficient schemes. In: Vaudenay, S. (ed.) Public Key Cryptography—PKC 2005. Lecture Notes in Computer Science, vol. 3386, pp. 398–415. Springer, Heiedelberg (2005)

  5. Au, M.H., Chen, J., Liu, J.K., Mu, Y., Wong, D.S., Yang, G.: Malicious KGC attack in certificateless cryptography. In: Proceedings pf ACM Symposium on Information, Computer and Communications Security. ACM Press, New York (2007)

  6. Baek, J.: Important note on “Certificateless public key encryption without pairing” (2007). http://www1.i2r.a-star.edu.sg/~jsbaek/

  7. Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. In: Zhou, J., Lopez, J. (eds.) Proceedings of the 8th International Conference on Information Security (ISC 2005). Lecture Notes in Computer Science, vol. 3650, pp. 134–148. Springer, Heidelberg (2005)

  8. Baek, J., Wang, G.: Repairing a security-mediated certificateless encryption scheme from PKC 2006 (2006). http://eprint.iacr.org/2006/159

  9. Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) Advances in Cryptology—Eurocrypt 2006. Lecture Notes in Computer Science, vol. 4004, pp. 409–426. Springer, Heidelberg (2006)

  10. Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic constructions of identity-based and certificateless KEMs (2005). http://eprint.iacr.org/2005/058

  11. Boldyreva, A., Fischlin, M., Palacio, A., Warinschi, B.: A closer look at PKI: Security and efficiency. In: Okamoto, T., Wang, X. (eds.) Public Key Cryptography—PKC 2007. Lecture Notes in Computer Science, vol. 4450, pp. 458–475. Springer, Heidelberg (2007)

  12. Boneh, D., Katz, J.: Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. In: Menezes, A., (ed.) Topics in Cryptology—CT-RSA 2005. Lecture Notes in Computer Science, vol. 3376, pp. 87–103. Springer, Heidelberg (2005)

  13. Boyen, X., Mei, Q., Waters, B.: Direct chosen ciphertext security from identity-based techniques. In: Proceeding of the 12th ACM Conference on Computer and Communications Security, pp. 320–329 (2005)

  14. Cheng, Z., Comley, R.: Efficient certificateless public key encryption (2005). http://eprint.iacr.org/2005/012/

  15. Cramer R., Shoup V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J Comput 33(1), 167–226 (2004)

    Article  MathSciNet  Google Scholar 

  16. Dent, A.W., Libert, B., Paterson, K.G.: Certificateless encryption schemes strongly secure in the standard model (2007, Unpublished Manuscript)

  17. Diffie W., Hellman M.: New directions in cryptography. IEEE Trans. Info. Theory 22, 644–654 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  18. Dodis, Y., Katz, J.: Chosen-ciphertext security of multiple encryption. In: Kilian, J. (ed.) Theory of Cryptography—TCC 2005. Lecture Notes in Computer Science, vol. 3378, pp. 188–209. Springer, Heidelberg (2005)

  19. Fujisaki, E., Okamoto, T.: How to enhance the security of public-key encryption at minimal cost. In: Imai, H., Zheng, Y. (eds.) Public Key Cryptography, Lecture Notes in Computer Science, vol. 1560, pp. 53–68. Springer, Heidelberg (1999)

  20. Galindo, D., Morillo, P., Ràfols, C.: Breaking Yum and Lee generic constructions of certificate-less and certificate-based encryption schemes. In: Atzeni, A.S., Lioy, A. (eds.) Public Key Infrastructure: 3rd European PKI Workshop (EuroPKI 2006). Lecture Notes in Computer Science, vol. 4043, pp. 81–91. Springer, Heidelberg (2006)

  21. Huang, Q., Wong, D.S.: Generic certificateless encryption in the standard model. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) Advances in Information and Computer Security (IWSEC 2007). Lecture Notes in Computer Science, vol. 4752, pp. 278–291. Springer, Heidelberg (2007)

  22. Huang, Q., Wong, D.S.: Generic certificateless key encapsulation mechanism. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) Information Security and Privacy (ACISP 2007). Lecture Notes in Computer Science, vol. 4586, pp. 215–299. Springer, Heidelberg (2007)

  23. Lai, J., Kou, K.: Self-generated-certificate public key encryption without pairing. In: Okamoto, T., Wang, X. (eds.) Public Key Cryptography—PKC 2007, Lecture Notes in Computer Science, vol. 4450, pp. 476–489. Springer, Heidelberg (2007)

  24. Libert, B., Quisquater, J.J.: On constructing certificateless cryptosystems from identity based encryption. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) Public Key Cryptography—PKC 2006. Lecture Notes in Computer Science, vol. 3958, pp. 474–490. Springer, Heidelberg (2006)

  25. Liu, J.K., Au, M.H., Susilo, W.: Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In: Proceedings of the ACM Symposium on Information, Computer and Communications Security. ACM Press, New York (2007)

  26. Rivest R.L., Shamir A., Adleman L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  27. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) Advances in Cryptology—Crypto ’84. Lecture Notes in Computer Science, vol. 196, pp. 47–53. Springer, Heidelberg (1984)

  28. Shi, Y., Li, J.: Provable efficient certificateless public key encryption (2005). http://eprint.iacr.org/2005/287/

  29. Shoup, V.: Sequences of games: a tool for taming complexity in security proofs (2004). http://eprint.iacr.org/2004/332/

  30. Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) Advances in Cryptology—EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3494, pp. 114–127. Springer, Heidelberg (2005)

  31. Yum, D.H., Lee, P.J.: Generic construction of certificateless encryption. In: A.L. et al. (ed.) Computational Science and Its Applications—ICCSA 2004: Part I. Lecture Notes in Computer Science, vol. 3043, pp. 802–811. Springer, Heidelberg (2004)

  32. Yum, D.H., Lee, P.J.: Identity-based cryptography in public key management. In: Katsikas, S.K., Gritzalis, S., Lopez, J., (eds.) Public Key Infrastructure: 1st European PKI Workshop (EuroPKI 2004). Lecture Notes in Computer Science, vol. 3093, pp. 71–84. Springer, Heidelberg (2004)

  33. Zhang, Z., Feng, D.: On the security of a certificateless public-key encryption (2005). http://eprint.iacr.org/2005/426

  34. Zhang, Z., Wong, D.S., Xu, J., Feng, D.: Certificateless public-key signature: Security model and efficient construction. In: Zhou, J., Yung, M., Bao, F. (eds.) Applied Cryptography and Network Security. Lecture Notes in Computer Science, vol. 3989, pp. 293–308. Springer, Heidelberg (2006)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexander W. Dent.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Dent, A.W. A survey of certificateless encryption schemes and security models. Int. J. Inf. Secur. 7, 349–377 (2008). https://doi.org/10.1007/s10207-008-0055-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-008-0055-0

Keywords

Navigation