A survey of certificateless encryption schemes and security models

被引:0
|
作者
Alexander W. Dent
机构
[1] Information Security Group,
[2] Royal Holloway,undefined
来源
International Journal of Information Security | 2008年 / 7卷
关键词
Cryptography; Public-key cryptography; Certificateless cryptography; Certificateless encryption;
D O I
暂无
中图分类号
学科分类号
摘要
This paper surveys the literature on certificateless encryption schemes. In particular, we examine the large number of security models that have been proposed to prove the security of certificateless encryption schemes and propose a new nomenclature for these models. This allows us to “rank” the notions of security for a certificateless encryption scheme against an outside attacker and a passive key generation centre, and we suggest which of these notions should be regarded as the “correct” model for a secure certificateless encryption scheme. We also examine the security models that aim to provide security against an actively malicious key generation centre and against an outside attacker who attempts to deceive a legitimate sender into using an incorrect public key (with the intention to deny the legitimate receiver that ability to decrypt the ciphertext). We note that the existing malicious key generation centre model fails to capture realistic attacks that a malicious key generation centre might make and propose a new model. Lastly, we survey the existing certificateless encryption schemes and compare their security proofs. We show that few schemes provide the “correct” notion of security without appealing to the random oracle model. The few schemes that do provide sufficient security guarantees are comparatively inefficient. Hence, we conclude that more research is needed before certificateless encryption schemes can be thought to be a practical technology.
引用
收藏
页码:349 / 377
页数:28
相关论文
共 50 条
  • [1] A survey of certificateless encryption schemes and security models
    Dent, Alexander W.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (05) : 349 - 377
  • [2] A Survey on Security of Certificateless Signature Schemes
    Chen, Yu-Chi
    Tso, Raylin
    IETE TECHNICAL REVIEW, 2016, 33 (02) : 115 - 121
  • [3] Certificateless Signatures: New Schemes and Security Models
    Huang, Xinyi
    Mu, Yi
    Susilo, Willy
    Wong, Duncan S.
    Wu, Wei
    COMPUTER JOURNAL, 2012, 55 (04): : 457 - 474
  • [4] Security models for certificateless signature schemes revisited
    Shim, Kyung-Ah
    INFORMATION SCIENCES, 2015, 296 : 315 - 321
  • [5] On the Security of Certificateless Signature Schemes
    Sharma, Gaurav
    Bala, Suman
    Verma, Anil K.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [6] A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures
    Dent, Alexander W.
    PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS, 2010, 6391 : 1 - 16
  • [7] A survey analyzing encryption schemes for IoT security measuresA survey analyzing encryption schemes for IoT security...S. Dhiman et al.
    Shalini Dhiman
    Sumitra Nayak
    Ganesh Kumar Mahato
    Swarnendu Kumar Chakraborty
    The Journal of Supercomputing, 81 (6)
  • [8] A Survey of Advanced Encryption for Database Security: Primitives, Schemes, and Attacks
    Ganesh, Buvana
    Palmieri, Paolo
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2020, 2021, 12637 : 100 - 120
  • [9] CCA SECURE CERTIFICATELESS ENCRYPTION SCHEMES BASED ON RSA
    Vivek, S. Sree
    Selvi, S. Shamila Deva
    Rangan, C. Pandu
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 208 - 217
  • [10] Certificateless encryption schemes strongly secure in the standard model
    Dent, Alexander W.
    Libert, Benoit
    Patersoni, Kenneth G.
    PUBLIC KEY CRYPTOGRAPHY - PKC 2008, 2008, 4939 : 344 - +