Generic Constructions of Identity-Based and Certificateless KEMs

被引:0
|
作者
K. Bentahar
P. Farshim
J. Malone-Lee
N. P. Smart
机构
[1] University of Bristol,Department of Computer Science
来源
Journal of Cryptology | 2008年 / 21卷
关键词
Encryption Scheme; Random Oracle; Random Oracle Model; Challenge Ciphertext; Decryption Oracle;
D O I
暂无
中图分类号
学科分类号
摘要
We extend the concept of key encapsulation to the primitives of identity-based and certificateless encryption. We show that the natural combination of ID-KEMs or CL-KEMs with data encapsulation mechanisms results in encryption schemes that are secure in a strong sense. In addition, we give generic constructions of ID-KEMs and CL-KEMs that are provably secure in the random oracle model.
引用
收藏
页码:178 / 199
页数:21
相关论文
共 50 条
  • [1] Generic constructions of identity-based and certificateless KEMs
    Bentahar, K.
    Farshim, P.
    Malone-Lee, J.
    Smart, N. P.
    JOURNAL OF CRYPTOLOGY, 2008, 21 (02) : 178 - 199
  • [2] Identity-Based Identification Schemes from ID-KEMs
    Barapatre, Prateek
    Rangan, Chandrasekaran Pandu
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2013, 2013, 8204 : 111 - 129
  • [3] A Generic Construction of Identity-Based Signcryption
    Li, Fagen
    Xiong, Hu
    Liao, Yongjian
    2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 291 - 295
  • [4] New Constructions of Identity-Based Threshold Decryption
    ZHANG Leyou1
    2. Key Laboratory of Computer Networks and Information Security of Ministry of Education
    3. Xi’an Communications Institute
    Wuhan University Journal of Natural Sciences, 2010, 15 (03) : 222 - 226
  • [5] Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs
    Wang, Xin
    Li, Shimin
    Xue, Rui
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 463 - 481
  • [6] Certificateless and identity-based authenticated asymmetric group key agreement
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Deng, Hua
    Li, Jiangtao
    Liu, Jianwei
    Shi, Wenchang
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (05) : 559 - 576
  • [7] Certificateless and identity-based authenticated asymmetric group key agreement
    Lei Zhang
    Qianhong Wu
    Bo Qin
    Hua Deng
    Jiangtao Li
    Jianwei Liu
    Wenchang Shi
    International Journal of Information Security, 2017, 16 : 559 - 576
  • [8] Generic constructions for universal designated-verifier signatures and identity-based signatures from standard signatures
    Shahandashti, S. F.
    Safavi-Naini, R.
    IET INFORMATION SECURITY, 2009, 3 (04) : 152 - 176
  • [9] KDM security for identity-based encryption: Constructions and separations
    Chen, Yu
    Zhang, Jiang
    Deng, Yi
    Chang, Jinyong
    INFORMATION SCIENCES, 2019, 486 : 450 - 473
  • [10] Certificateless Proxy Identity-Based Signcryption Scheme Without Bilinear Pairings
    Qi Yanfeng
    Tang Chunming
    Lou Yu
    Xu Maozhi
    Guo Baoan
    CHINA COMMUNICATIONS, 2013, 10 (11) : 37 - 41