Abstract
We discuss the relationship between ID-based key agreement protocols, certificateless encryption and ID-based key encapsulation mechanisms. In particular we show how in some sense ID-based key agreement is a primitive from which all others can be derived. In doing so we focus on distinctions between what we term pure ID-based schemes and non-pure schemes, in various security models. We present security models for ID-based key agreement which do not “look natural” when considered as analogues of normal key agreement schemes, but which look more natural when considered in terms of the models used in certificateless encryption. We illustrate our models and constructions with two running examples, one pairing based and one non-pairing based. Our work highlights distinctions between the two approaches to certificateless encryption and adds to the debate about what is the “correct” security model for certificateless encryption.
Similar content being viewed by others
References
Abdalla, M., Bellare, M., Rogaway, P.: The oracle Diffie-Hellman assumptions and an analysis of DHIES. Topics in Cryptology–CT-RSA 2001, Springer LNCS 2020, pp. 143–158 (2001)
Al-Riyami, S.S.: Cryptographic Schemes Based on Elliptic Curve Pairings. Ph.D. Thesis, University of London, UK (2004)
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. Advances in Cryptology—Asiacrypt 2003, Springer LNCS 2894, pp. 452–473 (2003)
Al-Riyami, S.S., Paterson, K.G.: CBE from CL-PKE: a generic construction and efficient schemes. Public Key Cryptography—PKC 2005, Springer LNCS 3386, pp. 398–415 (2005)
Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. Information Security—ISC 2005, Springer LNCS 3650, pp. 134–148 (2005)
Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic constructions of identity-based and certificateless KEMs. J. Cryptol. 21: 178–199 (2008). Full version at IACR e-print 2005/058
Boneh, D., Boyen, X.: Short Signatures without Random Oracles. Advances in Cryptology—Eurocrypt 2004, Springer LNCS 3027, pp. 56–73 (2004)
Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. Advances in Cryptology—Crypto 2001, Springer LNCS 2139, pp. 213–229 (2001)
Canetti, R., Goldreich, O., Goldwasser, S., Micali, S.: Resettable Zero-Knowledge. Weizmann Science Press of Israel (1999)
Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. Advances in Cryptology—Eurocrypt 2001, Springer-Verlag LNCS 2045, pp. 453–474 (2001)
Chen L., Cheng Z., Smart N.P.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6, 213–241 (2007)
Chen, L., Kudla, C.: Identity based authenticated key agreement from pairings. IEEE Computer Security Foundations Workshop, pp. 219–233 (2003). The modified version of this paper is available at Cryptology ePrint Archive, Report 2002/184
Choo, K.-K.R., Boyd, C., Hitchcock, Y.: Examining indistinguishabilit-based proof models for key establishment protocols. Advances in Cryptology—Asiacrypt 2005, Springer LNCS 3788, pp. 585–604 (2005)
Dent A.: A survey of certificateless encryption schemes and security models. Int. J. Inf. Secur. 7, 347–377 (2008)
Fiore, D., Gennaro, R.: Making the Diffie–Hellman protocol identity-based. Topics in Cryptology—CT-RSA 2010, Springer LNCS 5985, pp. 165–178 (2010). Also in IACR e-print archive, report 2009/174
Fiore, D., Gennaro, R., Smart, N.P.: Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement. Pairing 2010, Springer LNCS 6487, pp. 167–186 (2011)
Lynn, B.: Authenticated identity-based encryption. IACR e-print 2002/072 (2002)
McCullagh, N., Barreto, P.S.L.M.: A new two-party identity-based authenticated key agreement. Topics in Cryptology—CT-RSA 2005, Springer LNCS 3376, pp. 262–274 (2005)
Paterson K., Srinivasan S.: On the relations between non-interactive key distribution, identity based-based encryption and trapdoor discrete log groups. Des. Codes Cryptogr. 52, 219–241 (2009)
Scott, M.: Authenticated ID-based key exchange and remote log-in with insecure token and PIN number. Cryptology ePrint Archive, Report 2002/164
Shamir, A: Identity-Based Cryptosystems and Signature Schemes Advances in Cryptology—Proceedings of CRYPTO ’84, 1985, pp. 47–53
Smart N.P.: An identity based authenticated key agreement protocol based on the Weil pairing. Electron. Lett. 38, 630–632 (2002)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Fiore, D., Gennaro, R. & Smart, N.P. Relations between the security models for certificateless encryption and ID-based key agreement. Int. J. Inf. Secur. 11, 1–22 (2012). https://doi.org/10.1007/s10207-011-0149-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-011-0149-y