TY - GEN
T1 - Generic certificateless key encapsulation mechanism
AU - Huang, Qiong
AU - Wong, Duncan S.
PY - 2007
Y1 - 2007
N2 - We propose the first generic construction of certificateless key encapsulation mechanism (CL-KEM) in the standard model, which is also secure against malicious-but-passive KGC attacks. It is based on an ID-based KEM, a public key encryption and a message authentication code. The high efficiency of our construction is due to the efficient implementations of these underlying building blocks, and is comparable to Bentahar et al.'s CL-KEMs, which are only proven secure under the random oracle model with no consideration of the malicious-but-passive KGC attacks. The second contribution of our work is that we introduce the notion of certificateless tag-based KEM (CL-TKEM), which is an extension of Abe et al.'s work in the certificateless setting. We show that an efficient CL-TKEM can be constructed by modifying our CL-KEM. We also show that with a CL-TKEM and a one-time data encapsulation mechanism (DEM), an efficient hybrid certificateless encryption can be constructed by applying Abe et al.'s transformation in the certificateless setting. © Springer-Verlag Berlin Heidelberg 2007.
AB - We propose the first generic construction of certificateless key encapsulation mechanism (CL-KEM) in the standard model, which is also secure against malicious-but-passive KGC attacks. It is based on an ID-based KEM, a public key encryption and a message authentication code. The high efficiency of our construction is due to the efficient implementations of these underlying building blocks, and is comparable to Bentahar et al.'s CL-KEMs, which are only proven secure under the random oracle model with no consideration of the malicious-but-passive KGC attacks. The second contribution of our work is that we introduce the notion of certificateless tag-based KEM (CL-TKEM), which is an extension of Abe et al.'s work in the certificateless setting. We show that an efficient CL-TKEM can be constructed by modifying our CL-KEM. We also show that with a CL-TKEM and a one-time data encapsulation mechanism (DEM), an efficient hybrid certificateless encryption can be constructed by applying Abe et al.'s transformation in the certificateless setting. © Springer-Verlag Berlin Heidelberg 2007.
UR - http://www.scopus.com/inward/record.url?scp=38149126356&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-38149126356&origin=recordpage
U2 - 10.1007/978-3-540-73458-1_17
DO - 10.1007/978-3-540-73458-1_17
M3 - RGC 32 - Refereed conference paper (with host publication)
SN - 3540734570
SN - 9783540734574
VL - 4586 LNCS
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 215
EP - 229
BT - Information Security and Privacy
PB - Springer Verlag
T2 - 12th Australasian Conference on Information Security and Privacy (ACISP2007)
Y2 - 2 July 2007 through 4 July 2007
ER -