User menu

On constructing certificateless cryptosystems from identity based encryption

Bibliographic reference Libert, Benoît ; Quisquater, Jean-Jacques. On constructing certificateless cryptosystems from identity based encryption.9th International Conference on Theory and Practice of Public Key Cryptography (New York(Ny), Apr 24-26, 2006). In: Lecture Notes in Computer Science, Vol. 3958, p. 474-490 (2006)
Permanent URL http://hdl.handle.net/2078.1/59996
  1. Al-Riyami, S.S.: Cryptographic schemes based on elliptic curve pairings. PhD thesis, University of London (2004)
  2. Al-Riyami Sattam S., Paterson Kenneth G., Certificateless Public Key Cryptography, Advances in Cryptology - ASIACRYPT 2003 (2003) ISBN:9783540205920 p.452-473, 10.1007/978-3-540-40061-5_29
  3. Al-Riyami Sattam S., Paterson Kenneth G., CBE from CL-PKE: A Generic Construction and Efficient Schemes, Public Key Cryptography - PKC 2005 (2005) ISBN:9783540244547 p.398-415, 10.1007/978-3-540-30580-4_27
  4. Baek Joonsang, Safavi-Naini Reihaneh, Susilo Willy, Certificateless Public Key Encryption Without Pairing, Lecture Notes in Computer Science (2005) ISBN:9783540290018 p.134-148, 10.1007/11556992_10
  5. Barreto Paulo S. L. M., Lynn Ben, Scott Michael, On the Selection of Pairing-Friendly Groups, Selected Areas in Cryptography (2004) ISBN:9783540213703 p.17-25, 10.1007/978-3-540-24654-1_2
  6. Barreto Paulo S. L. M., Naehrig Michael, Pairing-Friendly Elliptic Curves of Prime Order, Selected Areas in Cryptography (2006) ISBN:9783540331087 p.319-331, 10.1007/11693383_22
  7. Scott Michael, Barreto Paulo S. L. M., Compressed Pairings, Advances in Cryptology – CRYPTO 2004 (2004) ISBN:9783540226680 p.140-156, 10.1007/978-3-540-28628-8_9
  8. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: 1st ACM Conference on Computer and Communications Security, pp. 62–73. ACM Press, New York (1993)
  9. Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic construction of identity-based and certificateless KEMs. Cryptology ePrint Archive, Report 2005/058 (2005), http://eprint.iacr.org/2005/058
  10. Boneh Dan, Boyen Xavier, Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Advances in Cryptology - EUROCRYPT 2004 (2004) ISBN:9783540219354 p.223-238, 10.1007/978-3-540-24676-3_14
  11. Boneh Dan, Boyen Xavier, Short Signatures Without Random Oracles, Advances in Cryptology - EUROCRYPT 2004 (2004) ISBN:9783540219354 p.56-73, 10.1007/978-3-540-24676-3_4
  12. Boneh Dan, Franklin Matt, Identity-Based Encryption from the Weil Pairing, Advances in Cryptology — CRYPTO 2001 (2001) ISBN:9783540424567 p.213-229, 10.1007/3-540-44647-8_13
  13. Canetti, R., Halevi, S., Katz, J.: A forward secure public key encryption scheme. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 254–271. Springer, Heidelberg (2003)
  14. Chen Liqun, Cheng Zhaohui, Security Proof of Sakai-Kasahara’s Identity-Based Encryption Scheme, Cryptography and Coding (2005) ISBN:9783540302766 p.442-459, 10.1007/11586821_29
  15. Chen, L., Cheng, Z., Malone-Lee, J., Smart, N.P.: An efficient ID-KEM based on the Sakai–Kasahara key construction. Cryptology ePrint Archive, Report 2005/224 (2005), http://eprint.iacr.org/2005/224
  16. Cheng, Z., Comley, R.: Efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/012 (2005), http://eprint.iacr.org/2005/012
  17. Dent, A., Kudla, C.: On Proofs of Security for Certificateless Cryptosystems. Cryptology ePrint Archive, Report 2005/348 (2005), http://eprint.iacr.org/2005/348
  18. Dodis Yevgeniy, Katz Jonathan, Chosen-Ciphertext Security of Multiple Encryption, Theory of Cryptography (2005) ISBN:9783540245735 p.188-209, 10.1007/978-3-540-30576-7_11
  19. Fujisaki Eiichiro, Okamoto Tatsuaki, How to Enhance the Security of Public-Key Encryption at Minimum Cost, Public Key Cryptography (1999) ISBN:9783540656449 p.53-68, 10.1007/3-540-49162-7_5
  20. Fujisaki Eiichiro, Okamoto Tatsuaki, Secure Integration of Asymmetric and Symmetric Encryption Schemes, Advances in Cryptology — CRYPTO’ 99 (1999) ISBN:9783540663478 p.537-554, 10.1007/3-540-48405-1_34
  21. ElGamal Taher, A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, Advances in Cryptology ISBN:9783540156581 p.10-18, 10.1007/3-540-39568-7_2
  22. Gentry Craig, Certificate-Based Encryption and the Certificate Revocation Problem, Lecture Notes in Computer Science (2003) ISBN:9783540140399 p.272-293, 10.1007/3-540-39200-9_17
  23. Girault Marc, Self-certified public keys, Advances in Cryptology — EUROCRYPT ’91 ISBN:9783540546207 p.490-497, 10.1007/3-540-46416-6_42
  24. Kang Bo Gyeong, Park Je Hong, Hahn Sang Geun, A Certificate-Based Signature Scheme, Topics in Cryptology – CT-RSA 2004 (2004) ISBN:9783540209966 p.99-111, 10.1007/978-3-540-24660-2_8
  25. Miyaji, A., Nakabayashi, M., Takano, S.: New explicit conditions of elliptic curve traces for FR-reduction. IEICE Transactions on Fundamentals E84-A(5), 1234–1243 (2001)
  26. Sakai, R., Kasahara, M.: ID-based cryptosystems with pairing on elliptic curve. In: SCIS 2003, Hamamatsu, Japan (2003), http://eprint.iacr.org/2003/054
  27. Shamir Adi, Identity-Based Cryptosystems and Signature Schemes, Advances in Cryptology ISBN:9783540156581 p.47-53, 10.1007/3-540-39568-7_5
  28. Smart, N.P., Vercauteren, F.: On computable isomorphisms in efficient pairing based systems. Cryptology ePrint Archive, Report 2005/116 (2005), http://eprint.iacr.org/2005/116
  29. Yum Dae Hyun, Lee Pil Joong, Generic Construction of Certificateless Encryption, Computational Science and Its Applications – ICCSA 2004 (2004) ISBN:9783540220541 p.802-811, 10.1007/978-3-540-24707-4_93
  30. Yum Dae Hyun, Lee Pil Joong, Generic Construction of Certificateless Signature, Information Security and Privacy (2004) ISBN:9783540223795 p.200-211, 10.1007/978-3-540-27800-9_18
  31. Yum Dae Hyun, Lee Pil Joong, Identity-Based Cryptography in Public Key Management, Public Key Infrastructure (2004) ISBN:9783540222163 p.71-84, 10.1007/978-3-540-25980-0_6
  32. Zhang Rui, Hanaoka Goichiro, Shikata Junji, Imai Hideki, On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?, Public Key Cryptography – PKC 2004 (2004) ISBN:9783540210184 p.360-374, 10.1007/978-3-540-24632-9_26
  33. Zhang Fangguo, Safavi-Naini Reihaneh, Susilo Willy, An Efficient Signature Scheme from Bilinear Pairings and Its Applications, Public Key Cryptography – PKC 2004 (2004) ISBN:9783540210184 p.277-290, 10.1007/978-3-540-24632-9_20