Efficient constructions of certificate-based key encapsulation mechanism

被引:4
作者
Lu, Yang [1 ]
Li, Jiguo [1 ]
机构
[1] HoHai Univ, Coll Comp & Informat Engn, 8,Focheng Xi Rd, Nanjing 211100, Jiangsu, Peoples R China
关键词
certificate-based encryption; key encapsulation mechanism; random oracle model; chosen-ciphertext security; standard model;
D O I
10.1504/IJIPT.2014.066374
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificate-based encryption is a useful primitive that combines identity-based encryption and traditional public key encryption while preserving some of their most attractive features. It not only simplifies the cumbersome certificate management in traditional public key encryption, but also overcomes the key escrow and distribution problems inherent in identity-based encryption. In this paper, we extend the concept of key encapsulation mechanism to the primitive of certificate-based encryption and introduce the notion of certificate-based key encapsulation mechanism. We propose two provably secure certificate-based key encapsulation mechanism schemes. We prove that one is chosen-ciphertext secure in the random oracle model and the other is chosen-ciphertext secure in the standard model. Performance analysis shows that the proposed schemes are quite efficient and practical.
引用
收藏
页码:96 / 106
页数:11
相关论文
共 50 条
  • [21] Improved certificate-based encryption in the standard model
    Galindo, David
    Morillo, Paz
    Rafols, Carla
    JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (07) : 1218 - 1226
  • [22] An Efficient and Compact Key Encapsulation Mechanism Based on NTRU Lattice
    Liang Z.
    Zheng J.
    Zhao Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (04): : 1049 - 1069
  • [23] A Certificate-Based Authenticated Key Agreement Protocol for SIP-Based VoIP Networks
    Luo, Ming
    Wen, Ying-You
    Zhao, Hong
    2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 3 - 10
  • [24] Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model
    Lu, Yang
    Li, Jiguo
    Shen, Jian
    COMPUTER JOURNAL, 2017, 60 (12) : 1729 - 1744
  • [25] Efficient Certificate-Based Proxy Re-encryption Scheme for Data Sharing in Public Clouds
    Lu, Yang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (07): : 2703 - 2718
  • [26] A Certificate-Based AKA Protocol Secure Against Public Key Replacement Attacks
    Lu, Yang
    Zhang, Quanling
    Li, Jiguo
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2019, 16 (04) : 754 - 765
  • [27] Generic Construction of Certificate-based Encryption
    Lu, Yang
    Li, Jiguo
    Xia, Junmo
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1589 - +
  • [28] Multi-receiver certificate-based encryption and application to public key broadcast encryption
    Sur, Chul
    Jung, Chae Duk
    Rhee, Kyung Hyune
    2007 ECSIS SYMPOSIUM ON BIO-INSPIRED, LEARNING, AND INTELLIGENT SYSTEMS FOR SECURITY, PROCEEDINGS, 2007, : 35 - +
  • [29] Certificate-based signature scheme in the standard model
    Zhou, Caixue
    Cui, Zongmin
    IET INFORMATION SECURITY, 2017, 11 (05) : 256 - 260
  • [30] Enhanced Certificate-Based Encryption Scheme without Bilinear Pairings
    Lu, Yang
    Zhang, Quanling
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (02): : 881 - 896