A survey of certificateless encryption schemes and security models

被引:0
|
作者
Alexander W. Dent
机构
[1] Information Security Group,
[2] Royal Holloway,undefined
来源
International Journal of Information Security | 2008年 / 7卷
关键词
Cryptography; Public-key cryptography; Certificateless cryptography; Certificateless encryption;
D O I
暂无
中图分类号
学科分类号
摘要
This paper surveys the literature on certificateless encryption schemes. In particular, we examine the large number of security models that have been proposed to prove the security of certificateless encryption schemes and propose a new nomenclature for these models. This allows us to “rank” the notions of security for a certificateless encryption scheme against an outside attacker and a passive key generation centre, and we suggest which of these notions should be regarded as the “correct” model for a secure certificateless encryption scheme. We also examine the security models that aim to provide security against an actively malicious key generation centre and against an outside attacker who attempts to deceive a legitimate sender into using an incorrect public key (with the intention to deny the legitimate receiver that ability to decrypt the ciphertext). We note that the existing malicious key generation centre model fails to capture realistic attacks that a malicious key generation centre might make and propose a new model. Lastly, we survey the existing certificateless encryption schemes and compare their security proofs. We show that few schemes provide the “correct” notion of security without appealing to the random oracle model. The few schemes that do provide sufficient security guarantees are comparatively inefficient. Hence, we conclude that more research is needed before certificateless encryption schemes can be thought to be a practical technology.
引用
收藏
页码:349 / 377
页数:28
相关论文
共 50 条
  • [11] Relations between the security models for certificateless encryption and ID-based key agreement
    D. Fiore
    R. Gennaro
    N. P. Smart
    International Journal of Information Security, 2012, 11 : 1 - 22
  • [12] Relations between the security models for certificateless encryption and ID-based key agreement
    Fiore, D.
    Gennaro, R.
    Smart, N. P.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (01) : 1 - 22
  • [13] DEVELOPMENT ON SECURITY MODELS FOR PROXY RE-ENCRYPTION SCHEMES
    Lo, Mamadou Makhtar
    Sow, Demba
    Ben Maaouia, Mohamed
    JP JOURNAL OF ALGEBRA NUMBER THEORY AND APPLICATIONS, 2024, 63 (01): : 1 - 21
  • [14] Security Model for Certificateless Aggregate Signature Schemes
    Zhang, Lei
    Zhang, Futai
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 925 - 929
  • [15] Notes on the security of certificateless aggregate signature schemes
    Zhang, Futai
    Shen, Limin
    Wu, Ge
    INFORMATION SCIENCES, 2014, 287 : 32 - 37
  • [16] Certificateless Aggregate Signature Schemes with Improved Security
    Nguyen Quoc Viet
    Ogata, Wakaha
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (01) : 92 - 99
  • [17] On the Security of a Certificateless Public Key Encryption with Keyword Search
    Wu, Tsu-Yang
    Meng, Chao
    Chen, Chien-Ming
    Wang, King-Hang
    Pan, Jeng-Shyang
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT I, 2018, 81 : 191 - 197
  • [18] On the Security of a Certificateless Searchable Public Key Encryption Scheme
    Wu, Tsu-Yang
    Meng, Fanya
    Chen, Chien-Ming
    Liu, Shuai
    Pan, Jeng-Shyang
    GENETIC AND EVOLUTIONARY COMPUTING, 2017, 536 : 113 - 119
  • [19] Security of Encryption Schemes in Weakened Random Oracle Models (Extended Abstract)
    Kawachi, Akinori
    Numayama, Akira
    Tanaka, Keisuke
    Xagawa, Keita
    PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS, 2010, 6056 : 403 - 419
  • [20] Security analysis and improvements of certificateless aggregate signature schemes
    Zhang, Yu-Lei
    Li, Chen-Yi
    Wang, Cai-Fen
    Zhang, Yong-Jie
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2015, 37 (08): : 1994 - 1999