Certificateless Public Key Cryptography: A Research Survey

被引:5
|
作者
Sayid, Jacob [1 ]
Sayid, Isaac [2 ]
Kar, Jayaprakash [3 ,4 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Informat Secur Res Grp, Dept Informat Technol, Jeddah 21589, Saudi Arabia
[2] King Abdulaziz Univ, Fac Comp & Informat Technol, Informat Secur Res Grp, Dept Informat Syst, Jeddah 21589, Saudi Arabia
[3] Fac Comp & Informat Technol, Dept Informat Syst, Jeddah, Saudi Arabia
[4] King Abdulaziz Univ, Informat Secur Res Grp, Jeddah, Saudi Arabia
关键词
Certificateless Cryptography; Public Key; Identity-Based Cryptography; Certificateless signatures;
D O I
10.14257/ijsia.2016.10.7.10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificateless Public Key Cryptography is a scheme that provides security by avoiding the key escrow and eliminating the drawback of identity-based cryptography. Several certificateless models have been proposed to enhance the efficiency and overcome adversaries attacks. In this paper, we survey various public key encryption schemes on certificateless setting with the security model and discuss the performance. Also, we present the generic model of Certificateless Public Key Encryption (CL-PKE) scheme proposed by various authors.
引用
收藏
页码:103 / 117
页数:15
相关论文
共 50 条
  • [1] Certificateless public key cryptography
    Al-Riyami, SS
    Paterson, KG
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 452 - 473
  • [2] Certificateless Public Key Cryptography in the Standard Model
    Canard, Sebastien
    Viet Cuong Trinh
    [J]. FUNDAMENTA INFORMATICAE, 2018, 161 (03) : 219 - 248
  • [3] A method for fast revocation of certificateless public key cryptography
    Ibrahim, Ibrahim I.
    Ibrahim, Maged H.
    Allam, Ali M.
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2006, : 250 - +
  • [4] Efficient revocation of security capability in certificateless public key cryptography
    Ju, HS
    Kim, DY
    Lee, DH
    Lim, J
    Chun, K
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2005, 3682 : 453 - 459
  • [5] A Provable Secure Scheme Based on Certificateless Public Key Cryptography
    Wang, Yanhong
    Ye, Junyao
    Ye, Junyao
    [J]. 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION ENGINEERING (CSIE 2015), 2015, : 14 - 18
  • [7] Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks
    Li, Fagen
    Shirase, Masaaki
    Takagi, Tsuyoshi
    [J]. NETWORK AND PARALLEL COMPUTING, 2008, 5245 : 116 - 126
  • [8] An efficient certificateless public key cryptography with authorized equality test in IIoT
    Elhabob, Rashad
    Zhao, Yanan
    Sella, Iva
    Xiong, Hu
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (03) : 1065 - 1083
  • [9] An efficient certificateless public key cryptography with authorized equality test in IIoT
    Rashad Elhabob
    Yanan Zhao
    Iva Sella
    Hu Xiong
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 1065 - 1083
  • [10] Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles
    Elhabob, Rashad
    Zhao, Yanan
    Sella, Iva
    Xiong, Hu
    [J]. IEEE ACCESS, 2019, 7 : 68957 - 68969