期刊文献+

Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model 被引量:6

Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model
原文传递
导出
摘要 Despite the large number of certificateless encryption schemes proposed recently, many of them have been found insecure under a practical attack, called malicious-but-passive KGC (Key Generation Center) attack. In this work we propose the first generic construction of certificateless encryption, which can be proven secure against malicious-but- passive KGC attacks in the standard model. In order to encrypt a message of any length, we consider the KEM/DEM (key encapsulation mechanism/data encapsulation mechanism) framework in the certificateless setting, and propose a generic construction of certificateless key encapsulation mechanism (CL-KEM) secure against malicious-but-passive KGC attacks in the standard model. It is based on an identity-based KEM, a public key encryption and a message authentication code. The high efficiency of our construction is due to the efficient implementations of these underlying building blocks, and is comparable to Bentahar et al.'s CL-KEMs, which have only been proven secure under the random oracle model with no consideration of the malicious-but-passive KGC attack. We also introduce the notion of certificateless tag-based KEM (CL-TKEM), which is an extension of Abe et al.'s work to the certificateless setting. We show that an efficient CL-TKEM can be constructed by modifying our CL-KEM scheme. We also show that with a CL-TKEM and a data encapsulation mechanism secure under our proposed security model, an efficient certificateless hybrid encryption can be constructed by applying Abe et al.'s transformation in the certificateless setting. Despite the large number of certificateless encryption schemes proposed recently, many of them have been found insecure under a practical attack, called malicious-but-passive KGC (Key Generation Center) attack. In this work we propose the first generic construction of certificateless encryption, which can be proven secure against malicious-but- passive KGC attacks in the standard model. In order to encrypt a message of any length, we consider the KEM/DEM (key encapsulation mechanism/data encapsulation mechanism) framework in the certificateless setting, and propose a generic construction of certificateless key encapsulation mechanism (CL-KEM) secure against malicious-but-passive KGC attacks in the standard model. It is based on an identity-based KEM, a public key encryption and a message authentication code. The high efficiency of our construction is due to the efficient implementations of these underlying building blocks, and is comparable to Bentahar et al.'s CL-KEMs, which have only been proven secure under the random oracle model with no consideration of the malicious-but-passive KGC attack. We also introduce the notion of certificateless tag-based KEM (CL-TKEM), which is an extension of Abe et al.'s work to the certificateless setting. We show that an efficient CL-TKEM can be constructed by modifying our CL-KEM scheme. We also show that with a CL-TKEM and a data encapsulation mechanism secure under our proposed security model, an efficient certificateless hybrid encryption can be constructed by applying Abe et al.'s transformation in the certificateless setting.
作者 黄琼 王石
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第4期807-826,共20页 计算机科学技术学报(英文版)
基金 supported by City Uunder Grant No.7002362
关键词 certificateless encryption malicious-but-passive KGC attack standard model key encapsulation mechanism certificateless encryption, malicious-but-passive KGC attack, standard model, key encapsulation mechanism
  • 相关文献

参考文献50

  • 1Huang Q, Wong D S. Generic certificateless key encapsulation mechanism. In Proc. ACISP 2007, Townsville, Australia, July 2-4, 2007, pp.215-229.
  • 2Huang Q, Wong D S. Generic certificateless encryption in the standard model. In Proc. IWSEC 2007, Nara, Japan, Oct. 29-31, 2007, pp.278-291.
  • 3Shamir A. Identity-based cryptosystems and signature schemes. In Proc. CRYPT01984, Santa Barbara, USA,Aug. 16-20, 1984, pp.47-53.
  • 4Al-Riyami S S, Paterson K G. Certificateless public key cryptography. In Proc. ASIACRYPT 2003, Taipei, China, Nov. 30-Dec. 4, 2003, pp.452-473.
  • 5Yum D H, Lee P J. Generic construction of certificateless sig- nature. In Proc. ACISP 2004, Sydney, Australia, July 13-14, 2004, pp.200-211.
  • 6Huang X, Susilo W, Mu Y, Zhang F. On the security of certificateless signature schemes from Asiacrypt 2003. In Proc. CANS 2005, Xiamen, China, Oct. 31-Nov. 3, 2005, pp.13-25.
  • 7Libert B, Quisquater J J. On constructing certificateless cryptosystems from identity based encryption. In Proc. PKC 2006, New York, USA, April 24-26, 2006, pp.474-490.
  • 8Hu B C, Wong D S, Zhang Z, Deng X. Key replacement attack against a generic construction of certificateless signature. In Proc. ACISP 2006, Melbourne, Australia, July 3-5, 2006, pp.235-246.
  • 9Au M H, Chen J K, Liu J K, Mu Y, Wong D S, Yang G. Malicious KGC attacks in certificateless cryptography. In Proc. ASIACCS 2007, Singapore, Mar. 20-22, 2007, pp.302-311.
  • 10Liu J K, Au M H, Susilo W. Self-generated-certificate public key cryptography and certificateless signaturc/encryption scheme in the standard model. In Proc. ASIACCS 2007, Singapore, Mar. 20-22, 2007, pp.302-311.

同被引文献46

  • 1AL-RIYAMI S, PATERSON K. Certificateless public key cryptography [ C ]//LNCS, vol 2894. Berlin : Springer-Verlag ,2003:452- 473.
  • 2ZHANG Lei, ZHANG Fu-tai, WU Wei. A provably secure ring signature scheme in certificateless cryptography [ C ]//LNCS, vol 4784. Berlin : Springer-Verlag,2007 : 103-121.
  • 3POINTCHEVAL D,STERN J. Security arguments for digital signatures and blind signatures [J]. ,Journal of Cryptolo0y,2000,33(3):361-396.
  • 4Cramer R,Shoup V.Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack[J].SIAM Journal on Computing,2004,33(1):167-226.
  • 5Abe M,Gennaro R,Kurosawa K.Tag-KEM/DEM:a new framework for hybrid encryption[J].Journal of Cryptology,2008(21):97-130.
  • 6Kurosawa K,Desmedt Y.A new paradigm of hybrid encryption scheme[C]//Proceedings of the 24th Annual International CryptologyConference.Santa Barbara,California,USA,2004:426-442.
  • 7Fujisaki E,Okamoto T.Secure integration of asymmetric and symmetric encryption schemes[C]//Proceedings of CRYPTO’99,Lecture Notes in Computer Science Volume 1666,1999:537-554.
  • 8赖欣.混合密码体制的理论研究与方案设计[D].西安:西安交通大学,2005.
  • 9Dent A.Hybrid signcryption schemes with insider security[C]//Proceedings ofthe 10th Australasian Conference on Information Security and Privacy,Lecture Notes in Computer ScienceVolume 3574,Brisbane,Australia,2005:253-266.
  • 10Dent A.Hybrid signcryption schemes with outsider security[C]//Proceedings ofthe 8th International Information Security Conference,Lecture Notes in Computer ScienceVolume3650,Singapore,2005:203-217.

引证文献6

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部