Skip to main content
Log in

Short-ciphertext and BDH-based CCA2 secure certificateless encryption

  • Research Papers
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

Certificateless public key cryptosystem actually belongs to identity based cryptography, with an attractive characteristic that the private key generator does not have access to any user’s full private key. Most of the existing certificateless encryption schemes employ the FO-technique and/or strong assumptions, for example GBDH, Gap-BDH and BDHI, to achieve adaptive chosen ciphertext security (CCA2 security). However, FO-technique introduces redundancy in ciphertext, and strong assumption reduces our confidence in the security of the underlying scheme. In this paper, we present a short-ciphertext CCA2 secure certificateless encryption scheme under the standard BDH assumption. Due to short ciphertext and convincing security, our scheme has practical value.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Shamir A. Identity-based cryptosystems and signature schemes. In: Proc of Crypto 1984, LNCS Vol 196. Berlin: Springer-Verlag, 1984. 47–53

    Google Scholar 

  2. Boneh D, Franklin M. Identity-based encryption from the weil pairing. In: Proc of CRYPTO 2001, LNCS Vol 2139. Berlin: Springer-Verlag, 2001. 213–229

    Google Scholar 

  3. Waters B. Efficient identity-based encryption without random oracles. In: Proc in EUROCRYPT 2005, LNCS, Vol 3494. Berlin: Springer-Verlag, 2005. 114–127

    Google Scholar 

  4. Xu P, Cui G, Fu C, et al. A more efficient accountable authority IBE scheme under DL assumption. Sci China Inf Sci, 2010, 53: 581–592

    Article  Google Scholar 

  5. Al-Riyami S S, Paterson K. Certificateless public key cryptography. In: Proc of Asiacrypt 2003, LNCS, Vol 2894. Berlin: Springer-Verlag, 2003. 452–473

    Google Scholar 

  6. Fujisaki E, Okamoto T. Secure integration of asymmetirc and symmetric encryption schemes. In: Proc of Crypto 1999, LNCS, Vol 1666. Berlin: Springer-Verlag, 1999. 537–554

    Google Scholar 

  7. Fujisaki E, Okamoto T. How to enhance the security of public-key encryption at minimal cost. In: Proc of PKC 1999, LNCS, Vol 1560. Berlin: Springer-Verlag, 1999. 53–68

    Google Scholar 

  8. Yum D, Lee P. Generic construction of certificateless encryption. In: Proc of ICCSA 2004, LNCS, Vol 3043. Berlin: Springer-Verlag, 2004. 802–811

    Google Scholar 

  9. Al-Riyami S S, Paterson K. CBE from CL-PKE: a generic construction and efficient schemes. In: Proc of PKC 2005, LNCS, Vol 3386. Berlin: Springer-Verlag, 2005. 398–415

    Google Scholar 

  10. Zhang Z, Feng D. On the security of a certificateless public-key encryption. Available at http://eprint.iacr.org/2005/426

  11. Libert B, Quisquater J J. On constructing certificateless cryptosystems from identity based encryption. In: Proc of PKC 2006, LNCS, Vol 3958. Berlin: Springer-Verlag, 2006. 474–490

    Google Scholar 

  12. Cheng Z, Comley R. Efficient certificateless public key encryption. Available at http://eprint.iacr.org/2005/012

  13. Baek J, Safavi-Naini R, Susilo W. Certificateless public key encryption without pairing. In: Proc of ISC 2005, LNCS, Vol 3650. Berlin: Springer-Verlag, 2005. 134–148

    Google Scholar 

  14. Sun Y, Zhang F, Baek J. Strongly secure certificateless public key encryption without pairing. In: Proc of CANS 2007, LNCS, Vol 4856. Berlin: Springer-Verlag, 2007. 194–208

    Google Scholar 

  15. Shi Y, Li J. Provable efficient certificateless public key encryption. Available at http://eprint.iacr.org/2005/287

  16. Dent A W. A survey of certificateless encryption schemes and security models. Int J Inf Secur, 2008, 7: 349–377

    Article  Google Scholar 

  17. Cheng Z, Chen L, Ling L, et al. General and efficient certificateless public key encryption constructions. In: Proc of Pairing 2007, LNCS, Vol 4575. Berlin: Springer-Verlag, 2007. 83–107

    Google Scholar 

  18. Liu J K, Au M H, Susilo W. Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In: Proc of the 2nd ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2007. 273–283

    Google Scholar 

  19. Huang Q, Wong D S. Generic certificateless key encapsulation. In: Proc of ACISP 2007, LNCS, Vol 4586. Berlin: Springer-Verlag, 2007. 215–229

    Google Scholar 

  20. Hwang Y H, Liu J K, Chow S S. Certificateless public key encryption secure against malicious KGC attacks in the standard model. J Univers Comput Sci, 2008, 14: 463–480

    MathSciNet  Google Scholar 

  21. Dent A W, Libert B, Paterson K G. Certificateless encryption schemes strongly secure in the standard model. In: Proc of PKC 2008, LNCS, Vol 4939. Berlin: Springer-Verlag, 2008. 344–359

    Google Scholar 

  22. Chow S S, Roth V, Rieffel E G. General certificateless encryption and timed-release encryption. In: Proc of SCN 2008, LNCS, Vol 5229. Berlin: Springer-Verlag, 2008. 126–143

    Google Scholar 

  23. Cash D, Kiltz E, Shoup V. The twin Diffie-Hellman problem and applications. J Crypt, 2009, 22: 470–504

    Article  MATH  MathSciNet  Google Scholar 

  24. Au M H, Chen J, Liu J K, et al. Malicious KGC attack in certificateless cryptography. In: Proc of ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2007. 302–311

    Google Scholar 

  25. Abe M, Kiltz E, Okamoto T. Compact CCA-secure encryption for messages of arbitrary length. In: Proc of PKC 2009, LNCS, Vol 5443. Berlin: Springer-Verlag, 2009. 377–392

    Google Scholar 

  26. Sun Y, Zhang F. Secure certificateless public key encryption without redundancy. Available at http://eprint.iacr.org/2008/487

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to YinXia Sun.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Sun, Y., Li, H. Short-ciphertext and BDH-based CCA2 secure certificateless encryption. Sci. China Inf. Sci. 53, 2005–2015 (2010). https://doi.org/10.1007/s11432-010-4076-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-010-4076-8

Keywords

Navigation