Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles

被引:9
作者
Yang, Wenjie [1 ]
Zhang, Futai [1 ,2 ]
Shen, Limin [1 ,2 ]
机构
[1] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[2] Jiangsu Engn Res Ctr Informat Secur & Privacy Pro, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
certificateless encryption scheme; chosen ciphertext attack; malicious KGC attack; bilinear map; standard model; IDENTITY-BASED ENCRYPTION; PUBLIC-KEY ENCRYPTION; GENERIC CONSTRUCTION; STRONGLY SECURE; SCHEMES; SIGNATURES;
D O I
10.1002/sec.826
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the key generation center (KGC) in a certificateless cryptosystem is no longer fully trusted, for practical applications, a secure certificateless encryption (CLE) scheme should withstand malicious KGC attacks. In this paper, we investigate practical CLE schemes withstanding attacks from a malicious KGC without resorting to random oracles. At first, we show the insecurity of the CLE scheme (ZW scheme) presented by Zhang and Wang. Although ZW scheme was proved to be chosen ciphertext secure without using random oracles, we find that it cannot resist attacks from a malicious KGC. We show an attack that demonstrates a malicious KGC can easily decrypt a target ciphertext using chosen ciphertext attack. After that, we introduce a new efficient CLE scheme. We prove its CCA2 security without using random oracles. Our new scheme not only gets rid of the security drawbacks of ZW scheme but also keeps its most distinctive feature of a short public key length. The formal security proofs of the new scheme are presented without using random oracles assuming the hardness of the decisional truncated q-augmented bilinear Diffie-Hellman exponent (q-ABDHE) problem and the hardness of the decisional bilinear Diffie-Hellman problem. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:445 / 454
页数:10
相关论文
共 27 条
  • [1] Al-Riyami SS, 2005, LECT NOTES COMPUT SC, V3386, P398
  • [2] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [3] [Anonymous], INFORM SCI
  • [4] [Anonymous], ADV INTELLIGENT NETW
  • [5] [Anonymous], EFFICIENT CERTIFICAT
  • [6] [Anonymous], C COMP COMM SEC P 2
  • [7] [Anonymous], 2012, TELKOMNIKA INDONESIA
  • [8] Baek J, 2005, LECT NOTES COMPUT SC, V3650, P134
  • [9] Bellare M, 2007, LECT NOTES COMPUT SC, V4450, P201
  • [10] Generic constructions of identity-based and certificateless KEMs
    Bentahar, K.
    Farshim, P.
    Malone-Lee, J.
    Smart, N. P.
    [J]. JOURNAL OF CRYPTOLOGY, 2008, 21 (02) : 178 - 199