Generic Constructions of Identity-Based and Certificateless KEMs

被引:0
|
作者
K. Bentahar
P. Farshim
J. Malone-Lee
N. P. Smart
机构
[1] University of Bristol,Department of Computer Science
来源
Journal of Cryptology | 2008年 / 21卷
关键词
Encryption Scheme; Random Oracle; Random Oracle Model; Challenge Ciphertext; Decryption Oracle;
D O I
暂无
中图分类号
学科分类号
摘要
We extend the concept of key encapsulation to the primitives of identity-based and certificateless encryption. We show that the natural combination of ID-KEMs or CL-KEMs with data encapsulation mechanisms results in encryption schemes that are secure in a strong sense. In addition, we give generic constructions of ID-KEMs and CL-KEMs that are provably secure in the random oracle model.
引用
收藏
页码:178 / 199
页数:21
相关论文
共 50 条
  • [41] Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts
    Tessaro, Stefano
    Wilson, David A.
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 257 - 274
  • [42] Identity-Based Matchmaking Encryption with Enhanced Privacy - A Generic Construction with Practical Instantiations
    Boyen, Xavier
    Li, Qinyi
    COMPUTER SECURITY - ESORICS 2023, PT II, 2024, 14345 : 425 - 445
  • [43] Identity-based provable data possession revisited: Security analysis and generic construction
    Liv, Hongyu
    Mu, Yi
    Zhao, Jining
    Xu, Chunxiang
    Wang, Huaqun
    Chen, Leiting
    Yu, Yong
    COMPUTER STANDARDS & INTERFACES, 2017, 54 : 10 - 19
  • [44] Identity-based proxy signatures: a generic construction and a concrete scheme from RSA
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Boyd, Colin
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3602 - 3614
  • [45] Identity-based proof of retrievability meets with identity-based network coding
    Chen, Yixin
    Chang, Jinyong
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (05): : 3067 - 3083
  • [46] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [47] Identity-based proof of retrievability meets with identity-based network coding
    Yixin Chen
    Jinyong Chang
    Cluster Computing, 2022, 25 : 3067 - 3083
  • [48] Certificateless Ring Signatures Based on the Improved Generic Construction of Certificateless Signatures
    Hou, Weihua
    Feng, Hanbin
    He, Dong
    Zhao, Zelin
    2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL III, 2010, : 371 - 374
  • [49] New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes
    Doettling, Nico
    Garg, Sanjam
    Hajiabadi, Mohammad
    Masny, Daniel
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 3 - 31
  • [50] Identity-Based Organizations
    Carvalho, Jean-Paul
    AMERICAN ECONOMIC REVIEW, 2016, 106 (05): : 410 - 414