On the relation among various security models for certificateless cryptography (Q1001679): Difference between revisions
From MaRDI portal
Set profile property. |
Set OpenAlex properties. |
||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1504/ijact.2008.021084 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W1976512735 / rank | |||
Normal rank |
Latest revision as of 08:41, 30 July 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | On the relation among various security models for certificateless cryptography |
scientific article |
Statements
On the relation among various security models for certificateless cryptography (English)
0 references
24 February 2009
0 references
Summary: Certificateless cryptography is a promising technology for solving the key escrow problem in identity-based cryptography. However, the lack of a unified set of definitions and security models currently hinders its progression as much effort has been put on refining the definitions and looking for an appropriate and practical security models. In this article, we aim to contribute on unifying the definitions and security models for Certificateless Encryption (CLE) schemes. First, we show that the original seven-algorithm definition is equivalent to a simplified five-algorithm definition. We believe that this simplified definition may lead to more compact and efficient implementations in practice and also help in the effort of standardisation of CLE. Secondly, we show that a CLE scheme cannot be both malicious Key Generation Center (KGC) secure and strongly secure in the standard model. Due to the practicality and attacking significance of malicious KGC security; and the uncertainty of how practical the strong security is, we, therefore, suggest constructing practical CLE schemes to be malicious KGC secure. Finally, we propose to formalise a new adversarial capability called partial key replacement attack into the security models and show that our generic scheme proposed recently is secure against this new type of attacks.
0 references
certificateless cryptography
0 references
certificateless encryption
0 references
security models
0 references
Key escrow
0 references
identity-based cryptography
0 references
malicious Key generation centre
0 references
KGC
0 references
partial Key replacement attack
0 references