Public Key Infrastructure

Volume 4043 of the series Lecture Notes in Computer Science pp 81-91

Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes

  • David GalindoAffiliated withInstitute for Computing and Information Sciences, Radboud University Nijmegen
  • , Paz MorilloAffiliated withUniversitat Politècnica de Catalunya
  • , Carla RàfolsAffiliated withUniversitat Politècnica de Catalunya

* Final gross prices may vary according to local VAT.

Get Access


Identity-based public key cryptography is aimed at simplifying the management of certificates in traditional public key infrastructures by means of using the identity of a user as its public key. The user must identify itself to a trusted authority in order to obtain the secret key corresponding to its identity. The main drawback of this special form of public key cryptography is that it is key escrowed. Certificate-based and certificate-less cryptography have been recently proposed as intermediate paradigms between traditional and identity-based cryptography, seeking to simplify the management of certificates while avoiding the key escrow property of identity-based cryptography. In this work we cryptanalyse the certificate-based and certificate-less encryption schemes presented by Yum and Lee at EuroPKI 2004 and ICCSA 2004 conferences.


public-key infrastructure identity-based encryption certificate-based and certificate-less encryption cryptanalysis