Efficient constructions of certificate-based key encapsulation mechanism

被引:4
作者
Lu, Yang [1 ]
Li, Jiguo [1 ]
机构
[1] HoHai Univ, Coll Comp & Informat Engn, 8,Focheng Xi Rd, Nanjing 211100, Jiangsu, Peoples R China
关键词
certificate-based encryption; key encapsulation mechanism; random oracle model; chosen-ciphertext security; standard model;
D O I
10.1504/IJIPT.2014.066374
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificate-based encryption is a useful primitive that combines identity-based encryption and traditional public key encryption while preserving some of their most attractive features. It not only simplifies the cumbersome certificate management in traditional public key encryption, but also overcomes the key escrow and distribution problems inherent in identity-based encryption. In this paper, we extend the concept of key encapsulation mechanism to the primitive of certificate-based encryption and introduce the notion of certificate-based key encapsulation mechanism. We propose two provably secure certificate-based key encapsulation mechanism schemes. We prove that one is chosen-ciphertext secure in the random oracle model and the other is chosen-ciphertext secure in the standard model. Performance analysis shows that the proposed schemes are quite efficient and practical.
引用
收藏
页码:96 / 106
页数:11
相关论文
共 50 条
[21]   Certificate-Based Encryption Scheme without Pairing [J].
Yao, Ji ;
Li, Jiguo ;
Zhang, Yichen .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (06) :1480-1491
[22]   An Efficient and Compact Key Encapsulation Mechanism Based on NTRU Lattice [J].
Liang Z. ;
Zheng J. ;
Zhao Y. .
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (04) :1049-1069
[23]   A Certificate-Based Authenticated Key Agreement Protocol for SIP-Based VoIP Networks [J].
Luo, Ming ;
Wen, Ying-You ;
Zhao, Hong .
2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, :3-10
[24]   Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model [J].
Lu, Yang ;
Li, Jiguo ;
Shen, Jian .
COMPUTER JOURNAL, 2017, 60 (12) :1729-1744
[25]   A Certificate-Based AKA Protocol Secure Against Public Key Replacement Attacks [J].
Lu, Yang ;
Zhang, Quanling ;
Li, Jiguo .
INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2019, 16 (04) :754-765
[26]   Efficient Certificate-Based Proxy Re-encryption Scheme for Data Sharing in Public Clouds [J].
Lu, Yang .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (07) :2703-2718
[27]   Generic Construction of Certificate-based Encryption [J].
Lu, Yang ;
Li, Jiguo ;
Xia, Junmo .
PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, :1589-+
[28]   Multi-receiver certificate-based encryption and application to public key broadcast encryption [J].
Sur, Chul ;
Jung, Chae Duk ;
Rhee, Kyung Hyune .
2007 ECSIS SYMPOSIUM ON BIO-INSPIRED, LEARNING, AND INTELLIGENT SYSTEMS FOR SECURITY, PROCEEDINGS, 2007, :35-+
[29]   Certificate-based signature scheme in the standard model [J].
Zhou, Caixue ;
Cui, Zongmin .
IET INFORMATION SECURITY, 2017, 11 (05) :256-260
[30]   Certificate-based verifiably encrypted RSA signatures [J].
Shao, Zuhua ;
Gao, Yipeng .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2015, 26 (02) :276-289