Cryptanalysis and improvement of a certificateless encryption scheme in the standard model

被引:0
|
作者
Lin Cheng
Qiaoyan Wen
Zhengping Jin
Hua Zhang
机构
[1] Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switch Technology
来源
关键词
certificateless public key cryptography; standard model; provable security;
D O I
暂无
中图分类号
学科分类号
摘要
Certificateless public key cryptography eliminates inherent key escrow problem in identity-based cryptography, and does not yet requires certificates as in the traditional public key infrastructure. In this paper, we give crypt-analysis to Hwang et al.’s certificateless encryption scheme which is the first concrete certificateless encryption scheme that can be proved to be secure against “malicious-but-passive” key generation center (KGC) attack in the standard model. Their scheme is proved to be insecure even in a weaker security model called “honest-but-curious” KGC attack model. We then propose an improved scheme which is really secure against “malicious-but-passive” KGC attack in the standard model.
引用
收藏
页码:163 / 173
页数:10
相关论文
共 50 条
  • [41] Cryptanalysis of a compact certificateless aggregate signature scheme
    Chen, Chih-Cheng
    Chien, Hanmin
    Horng, Gwoboa
    International Journal of Network Security, 2016, 18 (04) : 793 - 797
  • [42] Cryptanalysis of a certificateless signature scheme without pairings
    Tian, Miaomiao
    Huang, Liusheng
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2013, 26 (11) : 1375 - 1381
  • [43] Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model'
    Tang, Ying-Kai
    Chow, Sherman S. M.
    Liu, Joseph K.
    COMPUTER JOURNAL, 2015, 58 (04): : 779 - 781
  • [44] Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model
    Yang, Piyi
    Cao, Zhenfu
    Dong, Xiaolei
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 201 - 216
  • [45] Comments on 'Efficient revocable certificateless encryption secure in the standard model'
    Tang, Ying-Kai
    Chow, Sherman S.M.
    Liu, Joseph K.
    Computer Journal, 2015, 58 (04): : 779 - 781
  • [46] Cryptanalysis of a homomorphic encryption scheme
    Sonia Bogos
    John Gaspoz
    Serge Vaudenay
    Cryptography and Communications, 2018, 10 : 27 - 39
  • [47] Cryptanalysis and improvement of a certificateless partially blind signature
    Cheng, Lin
    Wen, Qiaoyan
    IET INFORMATION SECURITY, 2015, 9 (06) : 380 - 386
  • [48] Cryptanalysis of an Identity-Based Encryption Scheme With Equality Test and Improvement
    Liao, Yongjian
    Fan, Yu
    Liang, Yikuan
    Liu, Yulu
    Mohammed, Ramadan
    IEEE ACCESS, 2019, 7 : 75067 - 75072
  • [49] Cryptanalysis and improvement of an efficient and provably secure identity based signature scheme in the standard model
    Hu, Xiaoming
    Wang, Jian
    Yang, Yinchun
    Journal of Information and Computational Science, 2011, 8 (15): : 3347 - 3354
  • [50] Cryptanalysis of an image encryption scheme
    Li, Shujun
    Li, Chengqing
    Lo, Kwok-Tung
    Chen, Guanrong
    JOURNAL OF ELECTRONIC IMAGING, 2006, 15 (04)