Deakin University
Browse

Further observations on certificateless public key encryption

Version 2 2024-06-13, 08:46
Version 1 2014-10-28, 10:33
chapter
posted on 2024-06-13, 08:46 authored by X Wang, X Huang, X Yang
Certificateless public key encryption can be classified into two types, namely, CLE and CLE † , both of which were introduced by Al-Riyami and Paterson in Asiacrypt 2003. Most works about certificateless public key encryption belong to CLE, where the partial secret key is uniquely determined by an entity’s identity. In CLE † , an entity’s partial secret key is not only determined by the identity information but also by his/her (partial) public key. Such techniques can enhance the resilience of certificateless public key encryption against a cheating KGC. In this paper, we first formalize the security definitions of CLE † . After that, we demonstrate the gap between the security model of CLE † and CLE, by showing the insecurity of a CLE † scheme proposed by Lai and Kou in PKC 2007. We give an attack that can successfully break the indistinguishability of their CLE † scheme, although their scheme can be proved secure in the security model of CLE. Therefore, it does not suffice to consider the security of CLE † in the security model of CLE. Finally, we show how to secure Lai-Kou’s scheme by providing a new scheme with the security proof in the model of CLE †

History

Chapter number

18

Pagination

217-239

ISBN-13

9783642014406

Language

eng

Publication classification

B1.1 Book chapter

Copyright notice

2009, Springer

Extent

31

Editor/Contributor(s)

Yung M, Liu P, Lin D

Publisher

Springer-Verlag

Place of publication

Berlin, Germany

Title of book

Information security and cryptology

Series

Lecture Notes in Computer Science ; v.5487