Efficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model

被引:0
作者
Lu, Yang [1 ]
Li, Jiguo [1 ]
机构
[1] Hohai Univ, Coll Comp & Informat Engn, Nanjing 211100, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
public key encryption; certificate-based encryption; key replacement attack; standard model; 3-DDH problem; SIGNATURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificate-based encryption is a useful primitive that combines traditional public key encryption and identity-based encryption while preserving some of their most attractive features. It not only simplifies the cumbersome certificate management in traditional PIG, but also solves the key escrow problem inherent in identity-based encryption. In this paper, we propose a new certificate-based encryption scheme without random oracles that is provably secure against key replacement attacks. The proposed certificate-based encryption scheme is proven to be secure under the hardness of the decision 3-Party Diffie-Hellman problem in the standard model. Performance comparison shows that the proposed scheme outperforms all the previous standard-model certificate-based encryption schemes in the literature.
引用
收藏
页码:1553 / 1568
页数:16
相关论文
共 26 条
  • [1] Al-Riyami SS, 2005, LECT NOTES COMPUT SC, V3386, P398
  • [2] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [3] [Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
  • [4] [Anonymous], 13633 IEEE
  • [5] Au MH, 2007, LECT NOTES COMPUT SC, V4464, P79
  • [6] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [7] The random oracle methodology, revisited
    Canetti, R
    Goldreich, O
    Halevi, S
    [J]. JOURNAL OF THE ACM, 2004, 51 (04) : 557 - 594
  • [8] Cramer R., 1998, P CRYPT, P23
  • [9] Dent AW., 2006, 2006260 CRYPT EPRINT
  • [10] Improved certificate-based encryption in the standard model
    Galindo, David
    Morillo, Paz
    Rafols, Carla
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (07) : 1218 - 1226