Libert, Benoît
[UCL]
Quisquater, Jean-Jacques
[UCL]
Certificateless cryptography (CL-PKC) is a concept that aims at enjoying the advantages of identity based cryptography without suffering from its inherent key escrow. Several methods were recently suggested to generically construct a certificateless encryption (CLE) scheme by combining identity based schemes with ordinary public key cryptosystems. Whilst the security of one of these generic compositions was proved in a relaxed security model, we show that all them are insecure against chosen-ciphertext attacks in the strongest model of Al-Riyami and Paterson. We show how to easily fix these problems and give a method to achieve generic CLE constructions which are provably CCA-secure in the random oracle model. We finally propose a new efficient pairing-based scheme that performs better than previous proposals without precomputation. We also prove its security in the random oracle model.
- Al-Riyami, S.S.: Cryptographic schemes based on elliptic curve pairings. PhD thesis, University of London (2004)
- Al-Riyami Sattam S., Paterson Kenneth G., Certificateless Public Key Cryptography, Advances in Cryptology - ASIACRYPT 2003 (2003) ISBN:9783540205920 p.452-473, 10.1007/978-3-540-40061-5_29
- Al-Riyami Sattam S., Paterson Kenneth G., CBE from CL-PKE: A Generic Construction and Efficient Schemes, Public Key Cryptography - PKC 2005 (2005) ISBN:9783540244547 p.398-415, 10.1007/978-3-540-30580-4_27
- Baek Joonsang, Safavi-Naini Reihaneh, Susilo Willy, Certificateless Public Key Encryption Without Pairing, Lecture Notes in Computer Science (2005) ISBN:9783540290018 p.134-148, 10.1007/11556992_10
- Barreto Paulo S. L. M., Lynn Ben, Scott Michael, On the Selection of Pairing-Friendly Groups, Selected Areas in Cryptography (2004) ISBN:9783540213703 p.17-25, 10.1007/978-3-540-24654-1_2
- Barreto Paulo S. L. M., Naehrig Michael, Pairing-Friendly Elliptic Curves of Prime Order, Selected Areas in Cryptography (2006) ISBN:9783540331087 p.319-331, 10.1007/11693383_22
- Scott Michael, Barreto Paulo S. L. M., Compressed Pairings, Advances in Cryptology – CRYPTO 2004 (2004) ISBN:9783540226680 p.140-156, 10.1007/978-3-540-28628-8_9
- Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: 1st ACM Conference on Computer and Communications Security, pp. 62–73. ACM Press, New York (1993)
- Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic construction of identity-based and certificateless KEMs. Cryptology ePrint Archive, Report 2005/058 (2005),
http://eprint.iacr.org/2005/058
- Boneh Dan, Boyen Xavier, Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Advances in Cryptology - EUROCRYPT 2004 (2004) ISBN:9783540219354 p.223-238, 10.1007/978-3-540-24676-3_14
- Boneh Dan, Boyen Xavier, Short Signatures Without Random Oracles, Advances in Cryptology - EUROCRYPT 2004 (2004) ISBN:9783540219354 p.56-73, 10.1007/978-3-540-24676-3_4
- Boneh Dan, Franklin Matt, Identity-Based Encryption from the Weil Pairing, Advances in Cryptology — CRYPTO 2001 (2001) ISBN:9783540424567 p.213-229, 10.1007/3-540-44647-8_13
- Canetti, R., Halevi, S., Katz, J.: A forward secure public key encryption scheme. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 254–271. Springer, Heidelberg (2003)
- Chen Liqun, Cheng Zhaohui, Security Proof of Sakai-Kasahara’s Identity-Based Encryption Scheme, Cryptography and Coding (2005) ISBN:9783540302766 p.442-459, 10.1007/11586821_29
- Chen, L., Cheng, Z., Malone-Lee, J., Smart, N.P.: An efficient ID-KEM based on the Sakai–Kasahara key construction. Cryptology ePrint Archive, Report 2005/224 (2005),
http://eprint.iacr.org/2005/224
- Cheng, Z., Comley, R.: Efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/012 (2005),
http://eprint.iacr.org/2005/012
- Dent, A., Kudla, C.: On Proofs of Security for Certificateless Cryptosystems. Cryptology ePrint Archive, Report 2005/348 (2005),
http://eprint.iacr.org/2005/348
- Dodis Yevgeniy, Katz Jonathan, Chosen-Ciphertext Security of Multiple Encryption, Theory of Cryptography (2005) ISBN:9783540245735 p.188-209, 10.1007/978-3-540-30576-7_11
- Fujisaki Eiichiro, Okamoto Tatsuaki, How to Enhance the Security of Public-Key Encryption at Minimum Cost, Public Key Cryptography (1999) ISBN:9783540656449 p.53-68, 10.1007/3-540-49162-7_5
- Fujisaki Eiichiro, Okamoto Tatsuaki, Secure Integration of Asymmetric and Symmetric Encryption Schemes, Advances in Cryptology — CRYPTO’ 99 (1999) ISBN:9783540663478 p.537-554, 10.1007/3-540-48405-1_34
- ElGamal Taher, A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, Advances in Cryptology ISBN:9783540156581 p.10-18, 10.1007/3-540-39568-7_2
- Gentry Craig, Certificate-Based Encryption and the Certificate Revocation Problem, Lecture Notes in Computer Science (2003) ISBN:9783540140399 p.272-293, 10.1007/3-540-39200-9_17
- Girault Marc, Self-certified public keys, Advances in Cryptology — EUROCRYPT ’91 ISBN:9783540546207 p.490-497, 10.1007/3-540-46416-6_42
- Kang Bo Gyeong, Park Je Hong, Hahn Sang Geun, A Certificate-Based Signature Scheme, Topics in Cryptology – CT-RSA 2004 (2004) ISBN:9783540209966 p.99-111, 10.1007/978-3-540-24660-2_8
- Miyaji, A., Nakabayashi, M., Takano, S.: New explicit conditions of elliptic curve traces for FR-reduction. IEICE Transactions on Fundamentals E84-A(5), 1234–1243 (2001)
- Sakai, R., Kasahara, M.: ID-based cryptosystems with pairing on elliptic curve. In: SCIS 2003, Hamamatsu, Japan (2003),
http://eprint.iacr.org/2003/054
- Shamir Adi, Identity-Based Cryptosystems and Signature Schemes, Advances in Cryptology ISBN:9783540156581 p.47-53, 10.1007/3-540-39568-7_5
- Smart, N.P., Vercauteren, F.: On computable isomorphisms in efficient pairing based systems. Cryptology ePrint Archive, Report 2005/116 (2005),
http://eprint.iacr.org/2005/116
- Yum Dae Hyun, Lee Pil Joong, Generic Construction of Certificateless Encryption, Computational Science and Its Applications – ICCSA 2004 (2004) ISBN:9783540220541 p.802-811, 10.1007/978-3-540-24707-4_93
- Yum Dae Hyun, Lee Pil Joong, Generic Construction of Certificateless Signature, Information Security and Privacy (2004) ISBN:9783540223795 p.200-211, 10.1007/978-3-540-27800-9_18
- Yum Dae Hyun, Lee Pil Joong, Identity-Based Cryptography in Public Key Management, Public Key Infrastructure (2004) ISBN:9783540222163 p.71-84, 10.1007/978-3-540-25980-0_6
- Zhang Rui, Hanaoka Goichiro, Shikata Junji, Imai Hideki, On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?, Public Key Cryptography – PKC 2004 (2004) ISBN:9783540210184 p.360-374, 10.1007/978-3-540-24632-9_26
- Zhang Fangguo, Safavi-Naini Reihaneh, Susilo Willy, An Efficient Signature Scheme from Bilinear Pairings and Its Applications, Public Key Cryptography – PKC 2004 (2004) ISBN:9783540210184 p.277-290, 10.1007/978-3-540-24632-9_20
Bibliographic reference |
Libert, Benoît ; Quisquater, Jean-Jacques. On constructing certificateless cryptosystems from identity based encryption.9th International Conference on Theory and Practice of Public Key Cryptography (New York(Ny), Apr 24-26, 2006). In: Lecture Notes in Computer Science, Vol. 3958, p. 474-490 (2006) |
Permanent URL |
http://hdl.handle.net/2078.1/59996 |