Certificateless public key cryptography

被引:0
|
作者
Al-Riyami, SS [1 ]
Paterson, KG [1 ]
机构
[1] Univ London, Royal Holloway & Bedford New Coll, Informat Secur Grp, Egham TW20 0EX, Surrey, England
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper introduces and makes concrete the concept of certificateless public key cryptography (CL-PKC), a model for the use of public key cryptography which avoids the inherent escrow of identity-based cryptography and yet which does not require certificates to guarantee the authenticity of public keys. The lack of certificates and the presence of an adversary who has access to a master key necessitates the careful development of a new security model. We focus on certificateless public key encryption (CL-PKE), showing that a concrete pairing-based CL-PKE scheme is secure provided that an underlying problem closely related to the Bilinear Diffie-Hellman Problem is hard.
引用
收藏
页码:452 / 473
页数:22
相关论文
共 50 条
  • [1] Certificateless Public Key Cryptography: A Research Survey
    Sayid, Jacob
    Sayid, Isaac
    Kar, Jayaprakash
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (07): : 103 - 117
  • [2] Certificateless Public Key Cryptography in the Standard Model
    Canard, Sebastien
    Viet Cuong Trinh
    [J]. FUNDAMENTA INFORMATICAE, 2018, 161 (03) : 219 - 248
  • [3] A method for fast revocation of certificateless public key cryptography
    Ibrahim, Ibrahim I.
    Ibrahim, Maged H.
    Allam, Ali M.
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2006, : 250 - +
  • [4] Efficient revocation of security capability in certificateless public key cryptography
    Ju, HS
    Kim, DY
    Lee, DH
    Lim, J
    Chun, K
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2005, 3682 : 453 - 459
  • [5] A Provable Secure Scheme Based on Certificateless Public Key Cryptography
    Wang, Yanhong
    Ye, Junyao
    Ye, Junyao
    [J]. 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION ENGINEERING (CSIE 2015), 2015, : 14 - 18
  • [7] Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks
    Li, Fagen
    Shirase, Masaaki
    Takagi, Tsuyoshi
    [J]. NETWORK AND PARALLEL COMPUTING, 2008, 5245 : 116 - 126
  • [8] An efficient certificateless public key cryptography with authorized equality test in IIoT
    Elhabob, Rashad
    Zhao, Yanan
    Sella, Iva
    Xiong, Hu
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (03) : 1065 - 1083
  • [9] An efficient certificateless public key cryptography with authorized equality test in IIoT
    Rashad Elhabob
    Yanan Zhao
    Iva Sella
    Hu Xiong
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 1065 - 1083
  • [10] Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles
    Elhabob, Rashad
    Zhao, Yanan
    Sella, Iva
    Xiong, Hu
    [J]. IEEE ACCESS, 2019, 7 : 68957 - 68969