Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism

被引:8
作者
Long, Yu [1 ]
Chen, Kefei
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Technol, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Certificateless; Key encapsulation mechanism; Threshold cryptosystem; Chosen-ciphertext attack; Pairing based cryptosystem; ENCRYPTION;
D O I
10.1016/j.ins.2009.12.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a practical extension of our previous work on certificateless threshold cryptosystem, this paper proposes the first direct certificateless threshold key encapsulation mechanism that inherits the same trust level of the original scheme and removes the length limitation of a traditional public key encryption. Security against threshold chosen-ciphertext attacks are proved in a random oracle model under a new assumption. It tolerates the Type I adversary that can replace public keys and the Type II adversary that has access to the system's master key. The implied encapsulation scheme is very efficient when compared to the most efficient schemes in a traditional public key cryptosystem, and it is slightly more efficient in terms of key length and encapsulation speed when compared to the identity-based cryptosystems that have the same ciphertext overhead. Finally, we describe several potential modifications of our scheme. (C) 2009 Elsevier Inc. All rights reserved.
引用
收藏
页码:1167 / 1181
页数:15
相关论文
共 34 条
[21]  
Hu BC, 2006, LECT NOTES COMPUT SC, V4058, P235
[22]  
HUANG Q, 2007, 2007095 CRYPT EPRINT
[23]  
Kiltz E, 2007, LECT NOTES COMPUT SC, V4450, P282
[24]  
Kurosawa K, 2004, LECT NOTES COMPUT SC, V3152, P426
[25]  
LIU JK, 2006, 2006373 CRYPT EPRINT
[26]   Certificateless signcryption scheme in the standard model [J].
Liu, Zhenhua ;
Hu, Yupu ;
Zhang, Xiangsong ;
Ma, Hua .
INFORMATION SCIENCES, 2010, 180 (03) :452-464
[27]   Certificateless threshold cryptosystem secure against chosen-ciphertext attack [J].
Long, Yu ;
Chen, Kefei .
INFORMATION SCIENCES, 2007, 177 (24) :5620-5637
[28]  
Oh J, 2005, LECT NOTES COMPUT SC, V3803, P290
[29]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[30]  
Shamir A., 1985, WORKSHOP THEORY APPL, V196, P47, DOI [10.1007/3-540-39568-7_5, 10.1007/3-540-39568-75]