Published February 1, 2008
| Version v1
Journal article
Open
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Authors/Creators
- 1. Software Laboratories, Samsung Electronics Co., Ltd., Suwon, Republic of Korea
- 2. Institute for Infocomm Research (I2R), Singapore
- 3. New York University, New York, United States of America
Description
Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected security concern for certificateless public key encryption (CL-PKE) scheme, where a malicious key generation center (KGC) can compromise the confidentiality of the messages by embedding extra trapdoors in the system parameter. Although some schemes are secure against such an attack, they require random oracles to prove the security. In this paper, we first show that two existing CL-PKE schemes without random oracles are not secure against malicious KGC, we then propose the first CL-PKE scheme secure against malicious KGC attack, with proof in the standard model.
Files
jucs_article_28959.pdf
Files
(211.4 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:e35f245efaa37a7a2ea7ee7c08e95495
|
211.4 kB | Preview Download |