Certificateless public key cryptography

被引:0
|
作者
Al-Riyami, SS [1 ]
Paterson, KG [1 ]
机构
[1] Univ London, Royal Holloway & Bedford New Coll, Informat Secur Grp, Egham TW20 0EX, Surrey, England
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper introduces and makes concrete the concept of certificateless public key cryptography (CL-PKC), a model for the use of public key cryptography which avoids the inherent escrow of identity-based cryptography and yet which does not require certificates to guarantee the authenticity of public keys. The lack of certificates and the presence of an adversary who has access to a master key necessitates the careful development of a new security model. We focus on certificateless public key encryption (CL-PKE), showing that a concrete pairing-based CL-PKE scheme is secure provided that an underlying problem closely related to the Bilinear Diffie-Hellman Problem is hard.
引用
收藏
页码:452 / 473
页数:22
相关论文
共 50 条
  • [31] PUBLIC-KEY CRYPTOGRAPHY
    ODLYZKO, AM
    AT&T TECHNICAL JOURNAL, 1994, 73 (05): : 17 - 23
  • [32] Public key cryptography with matrices
    Singh, MK
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 146 - 152
  • [33] Computing public key cryptography
    Elektron, 2000, 17 (08): : 54 - 57
  • [34] Mobile Ad-hoc Network Key Management with Certificateless Cryptography
    Zhang, Zhenfei
    Susilo, Willy
    Raad, Raad
    ICSPCS: 2ND INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS, PROCEEDINGS, 2008, : 575 - +
  • [36] A Certificateless Threshold Public Key Encryption Scheme
    ZOU Xiubin1
    2.College of Computer and Mathematics
    3.Ira A.Fulton Schools of Engineering
    WuhanUniversityJournalofNaturalSciences, 2012, 17 (03) : 223 - 228
  • [37] Certificateless public key encryption with equality test
    Qu, Haipeng
    Yan, Zhen
    Lin, Xi-Jun
    Zhang, Qi
    Sun, Lin
    INFORMATION SCIENCES, 2018, 462 : 76 - 92
  • [38] Certificateless Public Key Encryption Made Practical
    Viet Cuong Trinh
    2017 4TH NAFOSTED CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2017, : 54 - 59
  • [39] Certificateless Public Key Encryption with Keyword Search
    Peng Yanguo
    Cui Jiangtao
    Peng Changgen
    Ying Zuobin
    CHINA COMMUNICATIONS, 2014, 11 (11) : 100 - 113
  • [40] Further Observations on Certificateless Public Key Encryption
    Wang, Xu an
    Huang, Xinyi
    Yang, Xiaoyuan
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 217 - 239