Skip to main content
Log in

Relations between the security models for certificateless encryption and ID-based key agreement

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

We discuss the relationship between ID-based key agreement protocols, certificateless encryption and ID-based key encapsulation mechanisms. In particular we show how in some sense ID-based key agreement is a primitive from which all others can be derived. In doing so we focus on distinctions between what we term pure ID-based schemes and non-pure schemes, in various security models. We present security models for ID-based key agreement which do not “look natural” when considered as analogues of normal key agreement schemes, but which look more natural when considered in terms of the models used in certificateless encryption. We illustrate our models and constructions with two running examples, one pairing based and one non-pairing based. Our work highlights distinctions between the two approaches to certificateless encryption and adds to the debate about what is the “correct” security model for certificateless encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Abdalla, M., Bellare, M., Rogaway, P.: The oracle Diffie-Hellman assumptions and an analysis of DHIES. Topics in Cryptology–CT-RSA 2001, Springer LNCS 2020, pp. 143–158 (2001)

  2. Al-Riyami, S.S.: Cryptographic Schemes Based on Elliptic Curve Pairings. Ph.D. Thesis, University of London, UK (2004)

  3. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. Advances in Cryptology—Asiacrypt 2003, Springer LNCS 2894, pp. 452–473 (2003)

  4. Al-Riyami, S.S., Paterson, K.G.: CBE from CL-PKE: a generic construction and efficient schemes. Public Key Cryptography—PKC 2005, Springer LNCS 3386, pp. 398–415 (2005)

  5. Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. Information Security—ISC 2005, Springer LNCS 3650, pp. 134–148 (2005)

  6. Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic constructions of identity-based and certificateless KEMs. J. Cryptol. 21: 178–199 (2008). Full version at IACR e-print 2005/058

    Google Scholar 

  7. Boneh, D., Boyen, X.: Short Signatures without Random Oracles. Advances in Cryptology—Eurocrypt 2004, Springer LNCS 3027, pp. 56–73 (2004)

  8. Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. Advances in Cryptology—Crypto 2001, Springer LNCS 2139, pp. 213–229 (2001)

  9. Canetti, R., Goldreich, O., Goldwasser, S., Micali, S.: Resettable Zero-Knowledge. Weizmann Science Press of Israel (1999)

  10. Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. Advances in Cryptology—Eurocrypt 2001, Springer-Verlag LNCS 2045, pp. 453–474 (2001)

  11. Chen L., Cheng Z., Smart N.P.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6, 213–241 (2007)

    Article  Google Scholar 

  12. Chen, L., Kudla, C.: Identity based authenticated key agreement from pairings. IEEE Computer Security Foundations Workshop, pp. 219–233 (2003). The modified version of this paper is available at Cryptology ePrint Archive, Report 2002/184

  13. Choo, K.-K.R., Boyd, C., Hitchcock, Y.: Examining indistinguishabilit-based proof models for key establishment protocols. Advances in Cryptology—Asiacrypt 2005, Springer LNCS 3788, pp. 585–604 (2005)

  14. Dent A.: A survey of certificateless encryption schemes and security models. Int. J. Inf. Secur. 7, 347–377 (2008)

    Article  Google Scholar 

  15. Fiore, D., Gennaro, R.: Making the Diffie–Hellman protocol identity-based. Topics in Cryptology—CT-RSA 2010, Springer LNCS 5985, pp. 165–178 (2010). Also in IACR e-print archive, report 2009/174

  16. Fiore, D., Gennaro, R., Smart, N.P.: Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement. Pairing 2010, Springer LNCS 6487, pp. 167–186 (2011)

  17. Lynn, B.: Authenticated identity-based encryption. IACR e-print 2002/072 (2002)

  18. McCullagh, N., Barreto, P.S.L.M.: A new two-party identity-based authenticated key agreement. Topics in Cryptology—CT-RSA 2005, Springer LNCS 3376, pp. 262–274 (2005)

  19. Paterson K., Srinivasan S.: On the relations between non-interactive key distribution, identity based-based encryption and trapdoor discrete log groups. Des. Codes Cryptogr. 52, 219–241 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  20. Scott, M.: Authenticated ID-based key exchange and remote log-in with insecure token and PIN number. Cryptology ePrint Archive, Report 2002/164

  21. Shamir, A: Identity-Based Cryptosystems and Signature Schemes Advances in Cryptology—Proceedings of CRYPTO ’84, 1985, pp. 47–53

  22. Smart N.P.: An identity based authenticated key agreement protocol based on the Weil pairing. Electron. Lett. 38, 630–632 (2002)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. P. Smart.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Fiore, D., Gennaro, R. & Smart, N.P. Relations between the security models for certificateless encryption and ID-based key agreement. Int. J. Inf. Secur. 11, 1–22 (2012). https://doi.org/10.1007/s10207-011-0149-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-011-0149-y

Keywords

Navigation