Generic certificateless key encapsulation mechanism

Qiong Huang, Duncan S. Wong

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

26 Citations (Scopus)

Abstract

We propose the first generic construction of certificateless key encapsulation mechanism (CL-KEM) in the standard model, which is also secure against malicious-but-passive KGC attacks. It is based on an ID-based KEM, a public key encryption and a message authentication code. The high efficiency of our construction is due to the efficient implementations of these underlying building blocks, and is comparable to Bentahar et al.'s CL-KEMs, which are only proven secure under the random oracle model with no consideration of the malicious-but-passive KGC attacks. The second contribution of our work is that we introduce the notion of certificateless tag-based KEM (CL-TKEM), which is an extension of Abe et al.'s work in the certificateless setting. We show that an efficient CL-TKEM can be constructed by modifying our CL-KEM. We also show that with a CL-TKEM and a one-time data encapsulation mechanism (DEM), an efficient hybrid certificateless encryption can be constructed by applying Abe et al.'s transformation in the certificateless setting. © Springer-Verlag Berlin Heidelberg 2007.
Original languageEnglish
Title of host publicationInformation Security and Privacy
Subtitle of host publication12th Australasian Conference, ACISP 2007, Proceedings
PublisherSpringer Verlag
Pages215-229
Volume4586 LNCS
ISBN (Print)3540734570, 9783540734574
DOIs
Publication statusPublished - 2007
Event12th Australasian Conference on Information Security and Privacy (ACISP2007) - Townsville, Australia
Duration: 2 Jul 20074 Jul 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4586 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference12th Australasian Conference on Information Security and Privacy (ACISP2007)
PlaceAustralia
CityTownsville
Period2/07/074/07/07

Fingerprint

Dive into the research topics of 'Generic certificateless key encapsulation mechanism'. Together they form a unique fingerprint.

Cite this