An efficient and provably secure certificateless key insulated encryption with applications to mobile internet

被引:3
|
作者
He L. [1 ]
Yuan C. [1 ]
Xiong H. [1 ]
Qin Z. [1 ]
机构
[1] School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan
基金
中国国家自然科学基金;
关键词
Bilinear pairing; Certificateless cryptography; Key-insulated;
D O I
10.6633/IJNS.201711.19(6).10
中图分类号
学科分类号
摘要
Certificateless encryption (CLE) alleviates the heavy certificate management in traditional public key encryption and the key escrow problem in the ID-based encryption simultaneously. Current CLE schemes assumed that the user's secret key is absolutely secure. Unfortunately, this assumption is too strong in case the CLE is deployed in the hostile setting and the leakage of the secret key is inevitable. In this paper, we present a new concept called a certificateless key insulated encryption scheme(CL-KIE). We argue that this is an important cryptographic primitive that can be used to achieve key-escrow free and keyexposure resilience. We also present an efficient CL-KIE scheme based on bilinear pairing. After that, the security of our scheme is proved under the Bilinear Diffie-Hellman assumption in the random oracle model. Further, the potential applications of CL-KIE is also briefly illustrated.
引用
收藏
页码:940 / 949
页数:9
相关论文
共 50 条
  • [31] Efficient and Provably Secure Certificateless Multi-receiver Signcryption
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Shukla, Deepanshu
    Chandrasekaran, Pandu Rangan
    [J]. PROVABLE SECURITY, 2008, 5324 : 52 - +
  • [32] Efficient and Provably Secure Certificateless Signcryption from Bilinear Maps
    Xie, Wenjian
    Zhang, Zhang
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 558 - 562
  • [33] Efficient and provably secure certificateless signcryption from bilinear pairings
    Li, Pengcheng
    He, Mingxing
    Li, Xiao
    Liu, Wengang
    [J]. Journal of Computational Information Systems, 2010, 6 (11): : 3643 - 3650
  • [34] Strongly secure certificateless key-insulated signature secure in the standard model
    Yanan Chen
    Weixiang Xu
    Hu Xiong
    [J]. annals of telecommunications - annales des télécommunications, 2015, 70 : 395 - 405
  • [35] Strongly secure certificateless key-insulated signature secure in the standard model
    Chen, Yanan
    Xu, Weixiang
    Xiong, Hu
    [J]. ANNALS OF TELECOMMUNICATIONS, 2015, 70 (9-10) : 395 - 405
  • [36] Yet another efficient and provably-secure certificateless public key signature scheme without pairing
    School of Mathematics and Computer Engineering, Xihua University, Chengdu, China
    不详
    [J]. WRI Int. Conf. Commun. Mob. Comput., CMC, 2010, (51-55):
  • [37] Efficient and secure pairing-free certificateless strong key-insulated signature scheme
    Babu, A. Ramesh
    Gayathri, N. B.
    Reddy, P. Vasudeva
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2019, 23 (03) : 155 - 166
  • [38] Efficient and Secure Certificateless Proxy Re-Encryption
    Liu, Ya
    Wang, Hongbing
    Wang, Chunlu
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (04): : 2254 - 2275
  • [39] Efficient Revocable Certificateless Encryption Secure in the Standard Model
    Shen, Limin
    Zhang, Futai
    Sun, Yinxia
    [J]. COMPUTER JOURNAL, 2014, 57 (04): : 592 - 601
  • [40] An efficient and provably secure authenticated key agreement scheme for mobile edge computing
    Rakeei, Mohammadamin
    Moazami, Farokhlagha
    [J]. WIRELESS NETWORKS, 2022, 28 (07) : 2983 - 2999