Paper 2007/262

Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model

Yong Ho Hwang, Joseph K. Liu, and Sherman S. M. Chow

Abstract

Recently, Au et al. pointed out a seemingly neglected security concern for certificateless public key encryption (CL-PKE) scheme, where a malicious key generation center (KGC) can compromise the confidentiality of the messages by embedding extra trapdoors in the system parameter. Although some schemes are secure against such an attack, they require random oracles to prove the security. In this paper, we first show that two existing CL-PKE schemes without random oracles are not secure against malicious KGC, we then propose the first CL-PKE scheme secure against malicious KGC attack, with proof in the standard model.

Metadata
Available format(s)
PDF PS
Category
Public-key cryptography
Publication info
Published elsewhere. Journal of Universal Computer Science, Volume 14, Issue 3, pp. 463-480
Keywords
certificateless encryptionpairingstandard modelmalicious KGC
Contact author(s)
ksliu9 @ gmail com
History
2008-03-12: last of 3 revisions
2007-07-09: received
See all versions
Short URL
https://ia.cr/2007/262
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2007/262,
      author = {Yong Ho Hwang and Joseph K.  Liu and Sherman S. M.  Chow},
      title = {Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model},
      howpublished = {Cryptology ePrint Archive, Paper 2007/262},
      year = {2007},
      note = {\url{https://eprint.iacr.org/2007/262}},
      url = {https://eprint.iacr.org/2007/262}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.