Efficient constructions of certificate-based key encapsulation mechanism

被引:4
作者
Lu, Yang [1 ]
Li, Jiguo [1 ]
机构
[1] HoHai Univ, Coll Comp & Informat Engn, 8,Focheng Xi Rd, Nanjing 211100, Jiangsu, Peoples R China
关键词
certificate-based encryption; key encapsulation mechanism; random oracle model; chosen-ciphertext security; standard model;
D O I
10.1504/IJIPT.2014.066374
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificate-based encryption is a useful primitive that combines identity-based encryption and traditional public key encryption while preserving some of their most attractive features. It not only simplifies the cumbersome certificate management in traditional public key encryption, but also overcomes the key escrow and distribution problems inherent in identity-based encryption. In this paper, we extend the concept of key encapsulation mechanism to the primitive of certificate-based encryption and introduce the notion of certificate-based key encapsulation mechanism. We propose two provably secure certificate-based key encapsulation mechanism schemes. We prove that one is chosen-ciphertext secure in the random oracle model and the other is chosen-ciphertext secure in the standard model. Performance analysis shows that the proposed schemes are quite efficient and practical.
引用
收藏
页码:96 / 106
页数:11
相关论文
共 50 条
[31]   Certificate-based verifiably encrypted RSA signatures [J].
Shao, Zuhua ;
Gao, Yipeng .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2015, 26 (02) :276-289
[32]   Certificate-Based Generalized Ring Signcryption Scheme [J].
Zhou, Caixue ;
Gao, Guangyong ;
Cui, Zongmin ;
Zhao, Zhiqiang .
INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2018, 29 (06) :1063-1088
[33]   Leakage-resilient certificate-based encryption [J].
Yu, Qihong ;
Li, Jiguo ;
Zhang, Yichen .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) :3346-3355
[34]   A pairing-free key-insulated certificate-based signature scheme with provable security [J].
Xiong, Hu ;
Wu, Shikun ;
Geng, Ji ;
Ahene, Emmanuel ;
Wu, Songyang ;
Qin, Zhiguang .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (03) :1246-1259
[35]   A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model [J].
Lu, Yang ;
Li, Jiguo .
INFORMATION SCIENCES, 2016, 372 :745-757
[36]   Certificate-Based Proxy Re-Encryption for Public Cloud Storage [J].
Sur, Chul ;
Park, Youngho ;
Shin, Sang Uk ;
Rhee, Kyung Hyune ;
Seo, Changho .
2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, :159-166
[37]   Continuous leakage-resilient certificate-based encryption [J].
Li, Jiguo ;
Guo, Yuyan ;
Yu, Qihong ;
Lu, Yang ;
Zhang, Yichen ;
Zhang, Futai .
INFORMATION SCIENCES, 2016, 355 :1-14
[38]   Certificate-Based Conditional Proxy Re-Encryption [J].
Li, Jiguo ;
Zhao, Xuexia ;
Zhang, Yichen .
NETWORK AND SYSTEM SECURITY, 2014, 8792 :299-310
[39]   Provably secure certificate-based encryption with leakage resilience [J].
Guo, Yuyan ;
Li, Jiguo ;
Lu, Yang ;
Zhang, Yichen ;
Zhang, Futai .
THEORETICAL COMPUTER SCIENCE, 2018, 711 :1-10
[40]   Anonymous Certificate-Based Broadcast Encryption With Personalized Messages [J].
Chen, Liqing ;
Li, Jiguo ;
Zhang, Yichen .
IEEE TRANSACTIONS ON BROADCASTING, 2020, 66 (04) :867-881