Paper 2007/095

Generic Certificateless Encryption in the Standard Model

Qiong Huang and Duncan S. Wong

Abstract

Despite the large number of certificateless encryption schemes recently proposed, many of them have been found to be insecure under a practical attack called \emph{malicious-but-passive} KGC attack, since they all follow the same key generation procedure as that of the one proposed by Al-Riyami and Paterson in ASIACRYPT 2003. The only provably secure certificateless encryption scheme against this attack is due to Libert and Quisquater (PKC 2006). However, the security can only be shown in the random oracle model. % In this paper, we first show that a scheme which has a different key generation procedure from that of Al-Riyami and Paterson also suffers from the malicious-but-passive KGC attack. Our attacking techniques are different from the previous attacks and may cause greater extent of damage than the previous ones. We also propose a generic construction of certificateless encryption which can be proven secure against this attack \emph{in the standard model}. This generic scheme is not only the first one proven secure in the standard model, but is also very efficient to instantiate. We also describe how to use short signature and hybrid encryption to construct highly efficient instantiations of this generic scheme.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Unknown where it was published
Keywords
certificateless encryption
Contact author(s)
csqhuang @ cityu edu hk
History
2007-03-22: received
Short URL
https://ia.cr/2007/095
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2007/095,
      author = {Qiong Huang and Duncan S.  Wong},
      title = {Generic Certificateless Encryption in the Standard Model},
      howpublished = {Cryptology {ePrint} Archive, Paper 2007/095},
      year = {2007},
      url = {https://eprint.iacr.org/2007/095}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.