On the relation among various security models for certificateless cryptography (Q1001679)

From MaRDI portal
Revision as of 16:11, 10 July 2023 by Importer (talk | contribs) (‎Created a new Item)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
scientific article
Language Label Description Also known as
English
On the relation among various security models for certificateless cryptography
scientific article

    Statements

    On the relation among various security models for certificateless cryptography (English)
    0 references
    0 references
    0 references
    24 February 2009
    0 references
    Summary: Certificateless cryptography is a promising technology for solving the key escrow problem in identity-based cryptography. However, the lack of a unified set of definitions and security models currently hinders its progression as much effort has been put on refining the definitions and looking for an appropriate and practical security models. In this article, we aim to contribute on unifying the definitions and security models for Certificateless Encryption (CLE) schemes. First, we show that the original seven-algorithm definition is equivalent to a simplified five-algorithm definition. We believe that this simplified definition may lead to more compact and efficient implementations in practice and also help in the effort of standardisation of CLE. Secondly, we show that a CLE scheme cannot be both malicious Key Generation Center (KGC) secure and strongly secure in the standard model. Due to the practicality and attacking significance of malicious KGC security; and the uncertainty of how practical the strong security is, we, therefore, suggest constructing practical CLE schemes to be malicious KGC secure. Finally, we propose to formalise a new adversarial capability called partial key replacement attack into the security models and show that our generic scheme proposed recently is secure against this new type of attacks.
    0 references
    0 references
    certificateless cryptography
    0 references
    certificateless encryption
    0 references
    security models
    0 references
    Key escrow
    0 references
    identity-based cryptography
    0 references
    malicious Key generation centre
    0 references
    KGC
    0 references
    partial Key replacement attack
    0 references