Paper 2010/619

Further Observations on Certificate-Base Encryption and its Generic Construction from Certificateless Public Key Encryption

Yang Lu

Abstract

Certificate-based encryption (CBE) is a new asymmetric encryption paradigm which was introduced to solve the certificate management problem in traditional public key encryption (PKI). It combines PKE and identity-based encryption (IBE) while preserving some of their most attractive features. CBE provides an efficient implicit certificate mechanism which eliminates the third-party queries and simplifies the certificate revocation problem in the traditional PKI. It also solves the key escrow problem and key distribution problem inherent in IBE. In this paper, we introduce the key replacement attack and the malicious-but-passive certifier attack into CBE, and define a class of new security models for CBE under different security levels according to the power of the adversaries against CBE. Our new security models are more elaborated and stronger compared with other existing ones. Then, we propose a generic construction of CBE from certificateless public key encryption and prove its security under the proposed security models in the standard model. We also show a concrete conversion using the proposed generic construction.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Unpublished Paper
Keywords
certificate-based encryptionsecurity modelgeneric constructioncertificateless public key encryptionstandard model
Contact author(s)
luyangnsd @ 163 com
History
2010-12-08: received
Short URL
https://ia.cr/2010/619
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2010/619,
      author = {Yang Lu},
      title = {Further Observations on Certificate-Base Encryption and its Generic Construction from Certificateless Public Key Encryption},
      howpublished = {Cryptology ePrint Archive, Paper 2010/619},
      year = {2010},
      note = {\url{https://eprint.iacr.org/2010/619}},
      url = {https://eprint.iacr.org/2010/619}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.