Efficient constructions of certificate-based key encapsulation mechanism

被引:4
作者
Lu, Yang [1 ]
Li, Jiguo [1 ]
机构
[1] HoHai Univ, Coll Comp & Informat Engn, 8,Focheng Xi Rd, Nanjing 211100, Jiangsu, Peoples R China
关键词
certificate-based encryption; key encapsulation mechanism; random oracle model; chosen-ciphertext security; standard model;
D O I
10.1504/IJIPT.2014.066374
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificate-based encryption is a useful primitive that combines identity-based encryption and traditional public key encryption while preserving some of their most attractive features. It not only simplifies the cumbersome certificate management in traditional public key encryption, but also overcomes the key escrow and distribution problems inherent in identity-based encryption. In this paper, we extend the concept of key encapsulation mechanism to the primitive of certificate-based encryption and introduce the notion of certificate-based key encapsulation mechanism. We propose two provably secure certificate-based key encapsulation mechanism schemes. We prove that one is chosen-ciphertext secure in the random oracle model and the other is chosen-ciphertext secure in the standard model. Performance analysis shows that the proposed schemes are quite efficient and practical.
引用
收藏
页码:96 / 106
页数:11
相关论文
共 50 条
  • [1] An Efficient Certificate-Based Encryption Scheme Without Random Oracles
    Guo, Lan
    Lu, Yang
    Miao, Qing
    Zu, Guangao
    Wang, Zhongqi
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 97 - 107
  • [2] Constructing Efficient Certificate-based Encryption with Paring
    Lu, Yang
    Li, Jiguo
    Xiao, Junmo
    JOURNAL OF COMPUTERS, 2009, 4 (01) : 19 - 26
  • [3] Efficient certificate-based encryption and hierarchical certificate-based encryption schemes in the standard model
    Hwang, Seong Oun
    Le, Minh-Ha
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 35 (06) : 5971 - 5981
  • [4] An Efficient and Provably Secure Certificate-Based Encryption Scheme
    Lu, Yang
    THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE, 2011, 164 : 54 - 61
  • [5] An Efficient Certificate-Based Authenticated Key Agreement Protocol Without Bilinear Pairing
    Lu, Yang
    Zhang, Quanling
    Li, Jiguo
    Shen, Jian
    INFORMATION TECHNOLOGY AND CONTROL, 2017, 46 (03): : 345 - 359
  • [6] Efficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model
    Lu, Yang
    Li, Jiguo
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2014, 30 (05) : 1553 - 1568
  • [7] Certificate-based encryption resilient to key leakage
    Yu, Qihong
    Li, Jiguo
    Zhang, Yichen
    Wu, Wei
    Huang, Xinyi
    Xiang, Yang
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 116 : 101 - 112
  • [8] A New Efficient Certificate-Based Signature Scheme
    Zhang Yichen
    Li Jiguo
    Wang Zhiwei
    Yao Wei
    CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (04) : 776 - 782
  • [9] A New Efficient Certificate-Based Signature Scheme
    ZHANG Yichen
    LI Jiguo
    WANG Zhiwei
    YAO Wei
    Chinese Journal of Electronics, 2015, 24 (04) : 776 - 782
  • [10] An Enhanced Certificate-Based Authenticated Key Agreement Protocol
    Luo, Ming
    Wen, Yingyou
    Zhao, Hong
    PROCEEDINGS OF 2008 INTERNATIONAL PRE-OLYMPIC CONGRESS ON COMPUTER SCIENCE, VOL I: COMPUTER SCIENCE AND ENGINEERING, 2008, : 200 - 206