Published February 1, 2008 | Version v1
Journal article Open

Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model

  • 1. Software Laboratories, Samsung Electronics Co., Ltd., Suwon, Republic of Korea
  • 2. Institute for Infocomm Research (I2R), Singapore
  • 3. New York University, New York, United States of America

Description

Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected security concern for certificateless public key encryption (CL-PKE) scheme, where a malicious key generation center (KGC) can compromise the confidentiality of the messages by embedding extra trapdoors in the system parameter. Although some schemes are secure against such an attack, they require random oracles to prove the security. In this paper, we first show that two existing CL-PKE schemes without random oracles are not secure against malicious KGC, we then propose the first CL-PKE scheme secure against malicious KGC attack, with proof in the standard model.

Files

jucs_article_28959.pdf

Files (211.4 kB)

Name Size Download all
md5:e35f245efaa37a7a2ea7ee7c08e95495
211.4 kB Preview Download