Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement

  • Dario Fiore
  • Rosario Gennaro
  • Nigel P. Smart
Conference paper

DOI: 10.1007/978-3-642-17455-1_11

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6487)
Cite this paper as:
Fiore D., Gennaro R., Smart N.P. (2010) Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement. In: Joye M., Miyaji A., Otsuka A. (eds) Pairing-Based Cryptography - Pairing 2010. Pairing 2010. Lecture Notes in Computer Science, vol 6487. Springer, Berlin, Heidelberg

Abstract

We discuss the relationship between ID-based key agreement protocols, certificateless encryption and ID-based key encapsulation mechanisms. In particular we show how in some sense ID-based key agreement is a primitive from which all others can be derived. In doing so we focus on distinctions between what we term pure ID-based schemes and non-pure schemes, in various security models. We present security models for ID-based key agreement which do not ”look natural” when considered as analogues of normal key agreement schemes, but which look more natural when considered in terms of the models used in certificateless encryption. Our work highlights distinctions between the two approaches to certificateless encryption, and adds to the debate about what is the ”correct” security model for certificateless encryption.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Dario Fiore
    • 1
  • Rosario Gennaro
    • 2
  • Nigel P. Smart
    • 3
  1. 1.École Normale Supérieure, CNRS - INRIAParisFrance
  2. 2.IBM T.J. Watson Research CenterHawthorneNew YorkU.S.A.
  3. 3.Dept. Computer ScienceUniversity of BristolBristolUnited Kingdom

Personalised recommendations