Browse > Article
http://dx.doi.org/10.13089/JKIISC.2004.14.5.165

An Efficient Certificateless Public Key Encryption Scheme  

이영란 (이화여자대학교)
이향숙 (이화여자대학교)
Abstract
Al-Riyami and Paterson$^{[1]}$ suggested the new public key paradigm which is called the certificateless public key system. This system takes the advantages of both traditional PKC and ID-based PKC. It does not require the use of certificates of the public key and does not have the key escrow problem caused from the ID-based cryptosystem. In this paper, we propose an efficient certificateless public key encryption scheme which satisfies mutual authentication. The security of our protocol is based on the hardness of two problems; the computational Diffie-Hellman problem(CDHP) and the bilinear Diffie-Hellman problem(BDHP). We also give a formal security model for both confidentiality and unforgeability, and then show that our scheme is probably secure in the random oracle model.
Keywords
certificateless public key cryptosystem; confidentality; unforgeability;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Gentry, A. Silverberg, Hierarchical ID-based cryptography, Advances in Cryptology-Asiacrypt'02, Lecture Notes in Computer Science 2501. SpringerVerlag, pp.548-566, 2002   DOI   ScienceOn
2 F. Hess, Efficient identity based signature schemes based on pairings, to appear in proceedings of SAC '2002. Springer Verlag, Lecture Notes in Computer Science series
3 B. Libert and J. J. Quisquater. New identity based signcryption schemes based on pairings, IEEE Information Theory Workshop 2003, Paris, France, or full version in Cryptology ePrint Archive, Report 2003/023, 2003, http:// eprint. iacr. org/.
4 A. Shamir. Identity-based cryptosysterns and signature schemes. In Proc. Crypto '84. LNCS 196. pages 47-53. 1984
5 이정연, 천정희, 김태성, 진승헌, Bilinear 함수를 이용한 ID 기반 대리서명 기법, 정보 보호 학회 논문지 제13권 제2호, 2003
6 N. P. Smart. An identity-based authenticated key agreement protocol based on the Weil pairing. Electronics Letters. Vol 38. pp 630-632, (2002)   DOI   ScienceOn
7 L. Chen. K. Harrison. A. Moss, D. Soldera. and N. P. Smart. Certification of public keys within an identity based system. In A. H. Chan and V. D. Gligor. editors. Information Security. 5th International Conference, ISC. volume 2433 of LNCS, pages 322-333. Springer-Verlag, 2002
8 E. Fujisaki, T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. Advances in Cryptology- Crypto'99. LNCS 1666. Springer. pp.537-554. 1999
9 B. Lynn. Authenticated identity-basedencryption. Cryptology ePrint Archive, Report 2002/072, 2002, http://eprint.iacr.org/
10 K. G. Paterson, ID-based signatures from pairings on elliptic curves, Electronics Letters, Vol. 38 (18) (2002). 1025-1026   DOI   ScienceOn
11 L. Chen and C. Kudla. Identity based authenticated key agreement from pairing. CSFW 2003: 219-233
12 김현주, 오수현, 원동호, 효율적인 ID 기반부분 은닉 서명에 관한 연구, 정보보호 학회논문지 제13권 제6호, 2003
13 D. Boneh and M. Franklin. Identitybased encryption from the weil pairing. In Proc. Crypto '01. LNCS 2139. pages 213-229. 2001. See (3) for the full version
14 D. Boneh and M. Franklin. Identitybased encryption from the weil pairing. SIAM J. of Computing. Vol. 32. No.3, pp. 586-615, 2003   DOI   ScienceOn
15 R. Dupont. A. Enge. Provably secure non-interactive key distribution based on pairings. to appear in Discrete Applied Mathematics. Preliminary version in Proceedings of the International Workshop on Coding and Cryptography. Versailles-WCC 2003
16 S. S. Al-Riyami, K. G. Paterson. Certificateless Public Key Cryptography. In Proc. Asiacrypt'03. LNCS 2784. Springer Verlag. Lecture Notes in Computer Science series, 2003
17 J. C. Cha and J. H. Cheon. An identity- based signature from gap DiffieHellman group, Public Key Cryptography 2003: 18-30
18 C. Gentry. Certificate-Based Encryption and the Certificate Revocation Problem, In E. Biham, editor, Advances in Cryptology- EUROCRYPT 2003, volume 2656 of LNCS, pages 272-193. Springer-Verlag, 2003
19 김태구, 염대현, 이필중, 보다 효율적인 Hierarchical ID-based cryptosystem. 정보 보호 학회 논문지 제13권 제3호, 2003