TY - GEN
T1 - Further observations on certificateless public key encryption
AU - Wang, Xu An
AU - Huang, Xinyi
AU - Yang, Xiaoyuan
PY - 2009
Y1 - 2009
N2 - Certificateless public key encryption can be classi.ed into two types, namely, CLE and CLE†, both of which were introduced by Al-Riyami and Paterson in Asiacrypt 2003. Most works about certicateless public key encryption belong to CLE, where the partial secret key is uniquely determined by an entity's identity. In CLE†, an entity's partial secret key is not only determined by the identity information but also by his/her (partial) public key. Such techniques can enhance the resilience of certificateless public key encryption against a cheating KGC. In this paper, we .rst formalize the security de.nitions of CLE†. After that, we demonstrate the gap between the security model of CLE† and CLE, by showing the insecurity of a CLE† scheme proposed by Lai and Kou in PKC 2007. We give an attack that can successfully break the indistinguishability of their CLE† scheme, although their scheme can be proved secure in the security model of CLE. Therefore, it does not su.ce to consider the security of CLE† in the security model of CLE. Finally, we show how to secure Lai-Kou's scheme by providing a new scheme with the security proof in the model of CLE†.
AB - Certificateless public key encryption can be classi.ed into two types, namely, CLE and CLE†, both of which were introduced by Al-Riyami and Paterson in Asiacrypt 2003. Most works about certicateless public key encryption belong to CLE, where the partial secret key is uniquely determined by an entity's identity. In CLE†, an entity's partial secret key is not only determined by the identity information but also by his/her (partial) public key. Such techniques can enhance the resilience of certificateless public key encryption against a cheating KGC. In this paper, we .rst formalize the security de.nitions of CLE†. After that, we demonstrate the gap between the security model of CLE† and CLE, by showing the insecurity of a CLE† scheme proposed by Lai and Kou in PKC 2007. We give an attack that can successfully break the indistinguishability of their CLE† scheme, although their scheme can be proved secure in the security model of CLE. Therefore, it does not su.ce to consider the security of CLE† in the security model of CLE. Finally, we show how to secure Lai-Kou's scheme by providing a new scheme with the security proof in the model of CLE†.
UR - https://www.scopus.com/pages/publications/67650135656
U2 - 10.1007/978-3-642-01440-6_18
DO - 10.1007/978-3-642-01440-6_18
M3 - 会议稿件
AN - SCOPUS:67650135656
SN - 9783642014390
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 217
EP - 239
BT - Information Security and Cryptology - 4th International Conference, Inscrypt 2008, Revised Selected Papers
T2 - 4th International Conference on Information Security and Cryptology, Inscrypt 2008
Y2 - 14 December 2008 through 17 December 2008
ER -