Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles
0202 electrical engineering, electronic engineering, information engineering
02 engineering and technology
DOI:
10.1002/sec.826
Publication Date:
2013-07-24T11:27:30Z
AUTHORS (3)
ABSTRACT
ABSTRACTAs the key generation center (KGC) in a certificateless cryptosystem is no longer fully trusted, for practical applications, a secure certificateless encryption (CLE) scheme should withstand malicious KGC attacks. In this paper, we investigate practical CLE schemes withstanding attacks from a malicious KGC without resorting to random oracles. At first, we show the insecurity of the CLE scheme (ZW scheme) presented by Zhang and Wang. Although ZW scheme was proved to be chosen ciphertext secure without using random oracles, we find that it cannot resist attacks from a malicious KGC. We show an attack that demonstrates a malicious KGC can easily decrypt a target ciphertext using chosen ciphertext attack. After that, we introduce a new efficient CLE scheme. We prove its CCA2 security without using random oracles. Our new scheme not only gets rid of the security drawbacks of ZW scheme but also keeps its most distinctive feature of a short public key length. The formal security proofs of the new scheme are presented without using random oracles assuming the hardness of the decisional truncated q‐augmented bilinear Diffie‐Hellman exponent (q‐ABDHE) problem and the hardness of the decisional bilinear Diffie–Hellman problem. Copyright © 2013 John Wiley & Sons, Ltd.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (27)
CITATIONS (9)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....