Further observations on certificateless public key encryption

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Certificateless public key encryption can be classi.ed into two types, namely, CLE and CLE†, both of which were introduced by Al-Riyami and Paterson in Asiacrypt 2003. Most works about certicateless public key encryption belong to CLE, where the partial secret key is uniquely determined by an entity's identity. In CLE†, an entity's partial secret key is not only determined by the identity information but also by his/her (partial) public key. Such techniques can enhance the resilience of certificateless public key encryption against a cheating KGC. In this paper, we .rst formalize the security de.nitions of CLE†. After that, we demonstrate the gap between the security model of CLE† and CLE, by showing the insecurity of a CLE† scheme proposed by Lai and Kou in PKC 2007. We give an attack that can successfully break the indistinguishability of their CLE† scheme, although their scheme can be proved secure in the security model of CLE. Therefore, it does not su.ce to consider the security of CLE† in the security model of CLE. Finally, we show how to secure Lai-Kou's scheme by providing a new scheme with the security proof in the model of CLE†.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - 4th International Conference, Inscrypt 2008, Revised Selected Papers
Pages217-239
Number of pages23
DOIs
StatePublished - 2009
Externally publishedYes
Event4th International Conference on Information Security and Cryptology, Inscrypt 2008 - Beijing, China
Duration: 14 Dec 200817 Dec 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5487
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th International Conference on Information Security and Cryptology, Inscrypt 2008
Country/TerritoryChina
CityBeijing
Period14/12/0817/12/08

Fingerprint

Dive into the research topics of 'Further observations on certificateless public key encryption'. Together they form a unique fingerprint.

Cite this