A survey of certificateless encryption schemes and security models

被引:103
作者
Dent, Alexander W. [1 ]
机构
[1] Informat Secur Grp, Surrey, England
关键词
cryptography; public-key cryptography; certificateless cryptography; certificateless encryption;
D O I
10.1007/s10207-008-0055-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper surveys the literature on certificateless encryption schemes. In particular, we examine the large number of security models that have been proposed to prove the security of certificateless encryption schemes and propose a new nomenclature for these models. This allows us to "rank" the notions of security for a certificateless encryption scheme against an outside attacker and a passive key generation centre, and we suggest which of these notions should be regarded as the "correct" model for a secure certificateless encryption scheme. We also examine the security models that aim to provide security against an actively malicious key generation centre and against an outside attacker who attempts to deceive a legitimate sender into using an incorrect public key (with the intention to deny the legitimate receiver that ability to decrypt the ciphertext). We note that the existing malicious key generation centre model fails to capture realistic attacks that a malicious key generation centre might make and propose a new model. Lastly, we survey the existing certificateless encryption schemes and compare their security proofs. We show that few schemes provide the "correct" notion of security without appealing to the random oracle model. The few schemes that do provide sufficient security guarantees are comparatively inefficient. Hence, we conclude that more research is needed before certificateless encryption schemes can be thought to be a practical technology.
引用
收藏
页码:349 / 377
页数:29
相关论文
共 34 条
  • [1] Abe M, 2005, LECT NOTES COMPUT SC, V3494, P128
  • [2] Al-Riyami S.S, 2004, THESIS U LONDON ROYA
  • [3] Al-Riyami SS, 2005, LECT NOTES COMPUT SC, V3386, P398
  • [4] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [5] [Anonymous], 2005, P 12 ACM C COMP COMM
  • [6] AU MH, 2007, P ACM S INF COMP COM
  • [7] Baek J, 2005, LECT NOTES COMPUT SC, V3650, P134
  • [8] BAEK J, 2006, REPAIRING SECURITY M
  • [9] Baek J., 2007, IMPORTANT NOTE CERTI
  • [10] Bellare M, 2006, LECT NOTES COMPUT SC, V4004, P409