Abstract
Certificateless public key cryptosystem actually belongs to identity based cryptography, with an attractive characteristic that the private key generator does not have access to any user’s full private key. Most of the existing certificateless encryption schemes employ the FO-technique and/or strong assumptions, for example GBDH, Gap-BDH and BDHI, to achieve adaptive chosen ciphertext security (CCA2 security). However, FO-technique introduces redundancy in ciphertext, and strong assumption reduces our confidence in the security of the underlying scheme. In this paper, we present a short-ciphertext CCA2 secure certificateless encryption scheme under the standard BDH assumption. Due to short ciphertext and convincing security, our scheme has practical value.
Similar content being viewed by others
References
Shamir A. Identity-based cryptosystems and signature schemes. In: Proc of Crypto 1984, LNCS Vol 196. Berlin: Springer-Verlag, 1984. 47–53
Boneh D, Franklin M. Identity-based encryption from the weil pairing. In: Proc of CRYPTO 2001, LNCS Vol 2139. Berlin: Springer-Verlag, 2001. 213–229
Waters B. Efficient identity-based encryption without random oracles. In: Proc in EUROCRYPT 2005, LNCS, Vol 3494. Berlin: Springer-Verlag, 2005. 114–127
Xu P, Cui G, Fu C, et al. A more efficient accountable authority IBE scheme under DL assumption. Sci China Inf Sci, 2010, 53: 581–592
Al-Riyami S S, Paterson K. Certificateless public key cryptography. In: Proc of Asiacrypt 2003, LNCS, Vol 2894. Berlin: Springer-Verlag, 2003. 452–473
Fujisaki E, Okamoto T. Secure integration of asymmetirc and symmetric encryption schemes. In: Proc of Crypto 1999, LNCS, Vol 1666. Berlin: Springer-Verlag, 1999. 537–554
Fujisaki E, Okamoto T. How to enhance the security of public-key encryption at minimal cost. In: Proc of PKC 1999, LNCS, Vol 1560. Berlin: Springer-Verlag, 1999. 53–68
Yum D, Lee P. Generic construction of certificateless encryption. In: Proc of ICCSA 2004, LNCS, Vol 3043. Berlin: Springer-Verlag, 2004. 802–811
Al-Riyami S S, Paterson K. CBE from CL-PKE: a generic construction and efficient schemes. In: Proc of PKC 2005, LNCS, Vol 3386. Berlin: Springer-Verlag, 2005. 398–415
Zhang Z, Feng D. On the security of a certificateless public-key encryption. Available at http://eprint.iacr.org/2005/426
Libert B, Quisquater J J. On constructing certificateless cryptosystems from identity based encryption. In: Proc of PKC 2006, LNCS, Vol 3958. Berlin: Springer-Verlag, 2006. 474–490
Cheng Z, Comley R. Efficient certificateless public key encryption. Available at http://eprint.iacr.org/2005/012
Baek J, Safavi-Naini R, Susilo W. Certificateless public key encryption without pairing. In: Proc of ISC 2005, LNCS, Vol 3650. Berlin: Springer-Verlag, 2005. 134–148
Sun Y, Zhang F, Baek J. Strongly secure certificateless public key encryption without pairing. In: Proc of CANS 2007, LNCS, Vol 4856. Berlin: Springer-Verlag, 2007. 194–208
Shi Y, Li J. Provable efficient certificateless public key encryption. Available at http://eprint.iacr.org/2005/287
Dent A W. A survey of certificateless encryption schemes and security models. Int J Inf Secur, 2008, 7: 349–377
Cheng Z, Chen L, Ling L, et al. General and efficient certificateless public key encryption constructions. In: Proc of Pairing 2007, LNCS, Vol 4575. Berlin: Springer-Verlag, 2007. 83–107
Liu J K, Au M H, Susilo W. Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In: Proc of the 2nd ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2007. 273–283
Huang Q, Wong D S. Generic certificateless key encapsulation. In: Proc of ACISP 2007, LNCS, Vol 4586. Berlin: Springer-Verlag, 2007. 215–229
Hwang Y H, Liu J K, Chow S S. Certificateless public key encryption secure against malicious KGC attacks in the standard model. J Univers Comput Sci, 2008, 14: 463–480
Dent A W, Libert B, Paterson K G. Certificateless encryption schemes strongly secure in the standard model. In: Proc of PKC 2008, LNCS, Vol 4939. Berlin: Springer-Verlag, 2008. 344–359
Chow S S, Roth V, Rieffel E G. General certificateless encryption and timed-release encryption. In: Proc of SCN 2008, LNCS, Vol 5229. Berlin: Springer-Verlag, 2008. 126–143
Cash D, Kiltz E, Shoup V. The twin Diffie-Hellman problem and applications. J Crypt, 2009, 22: 470–504
Au M H, Chen J, Liu J K, et al. Malicious KGC attack in certificateless cryptography. In: Proc of ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2007. 302–311
Abe M, Kiltz E, Okamoto T. Compact CCA-secure encryption for messages of arbitrary length. In: Proc of PKC 2009, LNCS, Vol 5443. Berlin: Springer-Verlag, 2009. 377–392
Sun Y, Zhang F. Secure certificateless public key encryption without redundancy. Available at http://eprint.iacr.org/2008/487
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sun, Y., Li, H. Short-ciphertext and BDH-based CCA2 secure certificateless encryption. Sci. China Inf. Sci. 53, 2005–2015 (2010). https://doi.org/10.1007/s11432-010-4076-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11432-010-4076-8