DOI QR코드

DOI QR Code

An Efficient Certificateless Public Key Encryption Scheme

인증서 기반이 아닌 효율적인 공개키 암호화 기법

  • Published : 2004.10.01

Abstract

Al-Riyami and Paterson$^{[1]}$ suggested the new public key paradigm which is called the certificateless public key system. This system takes the advantages of both traditional PKC and ID-based PKC. It does not require the use of certificates of the public key and does not have the key escrow problem caused from the ID-based cryptosystem. In this paper, we propose an efficient certificateless public key encryption scheme which satisfies mutual authentication. The security of our protocol is based on the hardness of two problems; the computational Diffie-Hellman problem(CDHP) and the bilinear Diffie-Hellman problem(BDHP). We also give a formal security model for both confidentiality and unforgeability, and then show that our scheme is probably secure in the random oracle model.

Al-Riyami 와 Paterson$^{[1]}$ 은 Certificateless 공개키 시스템이라 부르는 새로운 공개키 패러다임을 제안하였다. 이 시스템은 공개키 암호기법과 ID-기반 암호기법 각각의 장점을 가지고 있다. 즉, 기존의 공개키 기반 구조상의 인증서를 필요로 하지 않으면서도 ID기반 암호 시스템의 본질적 성질인 키위탁(key escrow) 관련 파생문제를 가지지 않는다. 본 논문에서 우리는 양방향 사용자 인증을 만족하는 인증서를 사용하지 않는 효율적 암호 스킴을 제안한다. 제안하는 스킴의 안전성은 computational Diffie-Hellman 문제(CDHP)와 bilinear Diffie-Hellman 문제(BDHP)의 어려움에 기반한다. 기밀성과 위조 불가능성을 위한 안전성을 증명하기 위하여 모델을 설정하고 제안된 스킴이 랜덤한 오라클(random oracle) 모델에서 안전함을 증명한다.

Keywords

References

  1. S. S. Al-Riyami, K. G. Paterson. Certificateless Public Key Cryptography. In Proc. Asiacrypt'03. LNCS 2784. Springer Verlag. Lecture Notes in Computer Science series, 2003
  2. D. Boneh and M. Franklin. Identitybased encryption from the weil pairing. In Proc. Crypto '01. LNCS 2139. pages 213-229. 2001. See (3) for the full version
  3. D. Boneh and M. Franklin. Identitybased encryption from the weil pairing. SIAM J. of Computing. Vol. 32. No.3, pp. 586-615, 2003 https://doi.org/10.1137/S0097539701398521
  4. J. C. Cha and J. H. Cheon. An identity- based signature from gap DiffieHellman group, Public Key Cryptography 2003: 18-30
  5. L. Chen. K. Harrison. A. Moss, D. Soldera. and N. P. Smart. Certification of public keys within an identity based system. In A. H. Chan and V. D. Gligor. editors. Information Security. 5th International Conference, ISC. volume 2433 of LNCS, pages 322-333. Springer-Verlag, 2002
  6. L. Chen and C. Kudla. Identity based authenticated key agreement from pairing. CSFW 2003: 219-233
  7. R. Dupont. A. Enge. Provably secure non-interactive key distribution based on pairings. to appear in Discrete Applied Mathematics. Preliminary version in Proceedings of the International Workshop on Coding and Cryptography. Versailles-WCC 2003
  8. E. Fujisaki, T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. Advances in Cryptology- Crypto'99. LNCS 1666. Springer. pp.537-554. 1999
  9. C. Gentry. Certificate-Based Encryption and the Certificate Revocation Problem, In E. Biham, editor, Advances in Cryptology- EUROCRYPT 2003, volume 2656 of LNCS, pages 272-193. Springer-Verlag, 2003
  10. C. Gentry, A. Silverberg, Hierarchical ID-based cryptography, Advances in Cryptology-Asiacrypt'02, Lecture Notes in Computer Science 2501. SpringerVerlag, pp.548-566, 2002 https://doi.org/10.1007/3-540-36178-2_34
  11. F. Hess, Efficient identity based signature schemes based on pairings, to appear in proceedings of SAC '2002. Springer Verlag, Lecture Notes in Computer Science series
  12. B. Libert and J. J. Quisquater. New identity based signcryption schemes based on pairings, IEEE Information Theory Workshop 2003, Paris, France, or full version in Cryptology ePrint Archive, Report 2003/023, 2003, http:// eprint. iacr. org/.
  13. B. Lynn. Authenticated identity-basedencryption. Cryptology ePrint Archive, Report 2002/072, 2002, http://eprint.iacr.org/
  14. K. G. Paterson, ID-based signatures from pairings on elliptic curves, Electronics Letters, Vol. 38 (18) (2002). 1025-1026 https://doi.org/10.1049/el:20020682
  15. A. Shamir. Identity-based cryptosysterns and signature schemes. In Proc. Crypto '84. LNCS 196. pages 47-53. 1984
  16. N. P. Smart. An identity-based authenticated key agreement protocol based on the Weil pairing. Electronics Letters. Vol 38. pp 630-632, (2002) https://doi.org/10.1049/el:20020387
  17. 김태구, 염대현, 이필중, 보다 효율적인 Hierarchical ID-based cryptosystem. 정보 보호 학회 논문지 제13권 제3호, 2003
  18. 김현주, 오수현, 원동호, 효율적인 ID 기반부분 은닉 서명에 관한 연구, 정보보호 학회논문지 제13권 제6호, 2003
  19. 이정연, 천정희, 김태성, 진승헌, Bilinear 함수를 이용한 ID 기반 대리서명 기법, 정보 보호 학회 논문지 제13권 제2호, 2003