Certificateless public key encryption in the selective-ID security model (without random oracles)

Jong Hwan Park, Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

21 Citations (Scopus)

Abstract

The concept of Certificateless Public Key Encryption (CLPKE) eliminates the use of certificates in certified Public Key Encryption (PKE) scheme and the key-escrow problem in Identity Based Encryption (IBE) scheme. Al-Riyami and Paterson first proposed a CL-PKE scheme and proved its security in their security model (AP-model) using idealized random oracles. Several generic constructions were also proposed to construct a CL-PKE scheme by composing the standard PKE and IBE schemes. Recently, it was proved that some generic constructions are not secure against chosen ciphertext attacks in light of the security goals in the AP-model. In this paper, we show that all the known generic constructions are not secure against chosen ciphertext attacks, in the AP-model or a weaker security model than the AP-model. We also propose a CL-PKE scheme which is provably secure against chosen ciphertext attacks without random oracles. Our construction is proven secure in the selective-ID security model, reflecting the feature of CL-PKE scheme.

Original languageEnglish
Title of host publicationPairing-Based Cryptography - Pairing 2007 - First International Conference, Proceedings
Pages60-82
Number of pages23
DOIs
Publication statusPublished - 2007
Event1st International Conference on Pairing-Based Cryptography, Pairing 2007 - Tokyo, Japan
Duration: 2007 Jul 22007 Jul 4

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4575 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other1st International Conference on Pairing-Based Cryptography, Pairing 2007
Country/TerritoryJapan
CityTokyo
Period07/7/207/7/4

Keywords

  • Bilinear maps
  • Certificateless public key encryption
  • Chosen ciphertext security

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Certificateless public key encryption in the selective-ID security model (without random oracles)'. Together they form a unique fingerprint.

Cite this