TY - GEN
T1 - Generic certificateless encryption in the standard model
AU - Huang, Qiong
AU - Wong, Duncan S.
PY - 2007
Y1 - 2007
N2 - Despite the large number of certificateless encryption schemes recently proposed, many of them have been found to be insecure under a practical attack called malicious-but-passive KGC attack, since they all follow the same key generation procedure as that of the one proposed by AlRiyami and Paterson in ASIACRYPT 2003. The only scheme that remains secure against this attack is due to Libert and Quisquater (PKC 2006). However, the security can only be shown in the random oracle model. In this paper, we first show that a scheme which has a different key generation procedure from that of Al-Riyami and Paterson also suffers from the malicious-but-passive KGC attack. Our attacking techniques are different and may cause greater extent of damage than the previous ones. We also propose a generic construction of certificateless encryption which can be proven secure against this attack in the standard model. This generic scheme not only is the first one proven secure in the standard model, but is also very efficient to instantiate. We also describe how to use short signature and hybrid encryption to construct highly efficient instantiations of this generic scheme. © Springer-Verlag Berlin Heidelberg 2007.
AB - Despite the large number of certificateless encryption schemes recently proposed, many of them have been found to be insecure under a practical attack called malicious-but-passive KGC attack, since they all follow the same key generation procedure as that of the one proposed by AlRiyami and Paterson in ASIACRYPT 2003. The only scheme that remains secure against this attack is due to Libert and Quisquater (PKC 2006). However, the security can only be shown in the random oracle model. In this paper, we first show that a scheme which has a different key generation procedure from that of Al-Riyami and Paterson also suffers from the malicious-but-passive KGC attack. Our attacking techniques are different and may cause greater extent of damage than the previous ones. We also propose a generic construction of certificateless encryption which can be proven secure against this attack in the standard model. This generic scheme not only is the first one proven secure in the standard model, but is also very efficient to instantiate. We also describe how to use short signature and hybrid encryption to construct highly efficient instantiations of this generic scheme. © Springer-Verlag Berlin Heidelberg 2007.
UR - http://www.scopus.com/inward/record.url?scp=38149074788&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-38149074788&origin=recordpage
U2 - 10.1007/978-3-540-75651-4_19
DO - 10.1007/978-3-540-75651-4_19
M3 - RGC 32 - Refereed conference paper (with host publication)
SN - 9783540756507
T3 - Lecture Notes in Computer Science
SP - 278
EP - 291
BT - Advances in Information and Computer Security
PB - Springer
CY - Berlin, Heidelberg
T2 - 2nd International Workshop on Security (IWSEC 2007)
Y2 - 29 October 2007 through 31 October 2007
ER -