Constructing Certificate less Encryption and ID-Based Encryption from ID-Based Key Agreement

被引:0
作者
Fiore, Dario [1 ]
Gennaro, Rosario [2 ]
Smart, Nigel P. [3 ]
机构
[1] Ecole Normale Super, CNRS INRIA, 24 Rue Lhomond, F-75231 Paris, France
[2] IBM T J Watson Res Ctr, Hawthorne, NY 10562 USA
[3] Univ Bristol, Dept Comp Sci, Bristol, Avon, England
来源
PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010 | 2010年 / 6487卷
关键词
PROTOCOLS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We discuss the relationship between ID-based key agreement protocols, certificateless encryption and ID-based key encapsulation mechanisms. In particular we show how in some sense ID-based key agreement is a primitive from which all others can be derived. In doing so we focus on distinctions between what we term pure ID-based schemes and non-pure schemes, in various security models. We present security models for ID-based key agreement which do not "look natural" when considered as analogues of normal key agreement schemes, but which look more natural when considered in terms of the models used in certificateless encryption. Our work highlights distinctions between the two approaches to certificateless encryption, and adds to the debate about what is the "correct" security model for certificateless encryption.
引用
收藏
页码:167 / +
页数:3
相关论文
共 20 条
[1]  
Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P143
[2]  
Al-Riyami SS, 2005, LECT NOTES COMPUT SC, V3386, P398
[3]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[4]  
[Anonymous], LNCS
[5]  
[Anonymous], THESIS U LONDON
[6]  
Baek J, 2005, LECT NOTES COMPUT SC, V3650, P134
[7]  
Bentahar K., 2008, J CRYPTOL, V21, P178
[8]  
Blake-Wilson S, 1997, LECT NOTES COMPUT SC, V1355, P30, DOI 10.1007/BFb0024447
[9]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
[10]  
Canetti R., 1999, RESETTABLE ZERO KNOW