Generic Constructions of Identity-Based and Certificateless KEMs

被引:0
|
作者
K. Bentahar
P. Farshim
J. Malone-Lee
N. P. Smart
机构
[1] University of Bristol,Department of Computer Science
来源
Journal of Cryptology | 2008年 / 21卷
关键词
Encryption Scheme; Random Oracle; Random Oracle Model; Challenge Ciphertext; Decryption Oracle;
D O I
暂无
中图分类号
学科分类号
摘要
We extend the concept of key encapsulation to the primitives of identity-based and certificateless encryption. We show that the natural combination of ID-KEMs or CL-KEMs with data encapsulation mechanisms results in encryption schemes that are secure in a strong sense. In addition, we give generic constructions of ID-KEMs and CL-KEMs that are provably secure in the random oracle model.
引用
收藏
页码:178 / 199
页数:21
相关论文
共 50 条
  • [31] Identity-based encryption and hierarchical identity-based encryption
    University of Waterloo, Canada
    不详
    Cryptology Inf. Secur. Ser., 2009, (45-64):
  • [32] Generic Construction of Identity-Based Strong Key-Insulated Signature
    Zhou, Dehua
    Weng, Jian
    Chen, Kefei
    Zheng, Dong
    JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (04): : 629 - 635
  • [33] The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures
    Liang, Bei
    Li, Hongda
    Chang, Jinyong
    INFORMATION SECURITY, ISC 2015, 2015, 9290 : 21 - 41
  • [34] Efficient Generic Construction of Forward-Secure Identity-Based Signature
    Al Ebri, Noura
    Baek, Joonsang
    Shoufan, Abdulhadi
    Quang Hieu Vu
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 55 - 64
  • [35] The generic construction of continuous leakage-resilient identity-based cryptosystems
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    THEORETICAL COMPUTER SCIENCE, 2019, 772 : 1 - 45
  • [36] A generic construction for revocable identity-based encryption with subset difference methods
    Lee, Kwangsu
    PLOS ONE, 2020, 15 (09):
  • [37] A generic construction of identity-based proxy signature scheme in the standard model
    Hu X.
    Xu H.
    Wang J.
    Tan W.
    Yang Y.
    International Journal of Information and Computer Security, 2019, 11 (01) : 83 - 100
  • [38] An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks
    Li, Congcong
    Zhang, Xi
    Wang, Haiping
    Li, Dongfeng
    SENSORS, 2018, 18 (01)
  • [39] Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions
    Abdalla, Michel
    Catalano, Dario
    Fiore, Dario
    JOURNAL OF CRYPTOLOGY, 2014, 27 (03) : 544 - 593
  • [40] Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions
    Michel Abdalla
    Dario Catalano
    Dario Fiore
    Journal of Cryptology, 2014, 27 : 544 - 593