A method for fast revocation of certificateless public key cryptography

被引:0
|
作者
Ibrahim, Ibrahim I. [1 ]
Ibrahim, Maged H. [1 ]
Allam, Ali M. [1 ]
机构
[1] Helwan Univ, Fac Engn, Cairo, Egypt
关键词
D O I
10.1109/ICCES.2006.320456
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificateless Public Key Cryptography has very appealing features, namely it does not require any public key certification (traditional Public Key Cryptography) nor having key escrow problem (Identity-Based Cryptography). Unfortunately, construction of Certificateless Public Key Encryption (CLPKE) schemes has so far depended on the use of Identity-Based Encryption, which results in the bilinear pairing-based schemes that need costly operations. In this paper, we consider a relaxation of the original model of CLPKE and propose a new CLPKE scheme that does not depend on the bilinear pairings.
引用
收藏
页码:250 / +
页数:2
相关论文
共 50 条
  • [1] Efficient revocation of security capability in certificateless public key cryptography
    Ju, HS
    Kim, DY
    Lee, DH
    Lim, J
    Chun, K
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2005, 3682 : 453 - 459
  • [2] Certificateless public key cryptography
    Al-Riyami, SS
    Paterson, KG
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 452 - 473
  • [3] Certificateless Public Key Cryptography: A Research Survey
    Sayid, Jacob
    Sayid, Isaac
    Kar, Jayaprakash
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (07): : 103 - 117
  • [4] Certificateless Public Key Cryptography in the Standard Model
    Canard, Sebastien
    Viet Cuong Trinh
    [J]. FUNDAMENTA INFORMATICAE, 2018, 161 (03) : 219 - 248
  • [5] A method for fast revocation of public key certificates and security capabilities
    Boneh, D
    Ding, XH
    Tsudik, G
    Wong, CM
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, 2001, : 297 - 308
  • [6] A Provable Secure Scheme Based on Certificateless Public Key Cryptography
    Wang, Yanhong
    Ye, Junyao
    Ye, Junyao
    [J]. 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION ENGINEERING (CSIE 2015), 2015, : 14 - 18
  • [7] Efficient revocable certificateless public key encryption with a delegated revocation authority
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3713 - 3725
  • [9] A New Fast Modular Arithmetic Method in Public Key Cryptography
    WANG Bangju~ 1
    2. School of Science
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1645 - 1648
  • [10] Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks
    Li, Fagen
    Shirase, Masaaki
    Takagi, Tsuyoshi
    [J]. NETWORK AND PARALLEL COMPUTING, 2008, 5245 : 116 - 126