Skip to main content
Log in

Distributed certificateless key encapsulation mechanism secure against the adaptive adversary

  • Published:
Journal of Shanghai Jiaotong University (Science) Aims and scope Submit manuscript

Abstract

This paper proposes an adaptively secure solution to certificateless distributed key encapsulation mechanism from pairings by using Canetti’s adaptive secure key generation scheme based on discrete logarithm. The proposed scheme can withstand adaptive attackers that can choose players for corruption at any time during the run of the protocol, and this kind of attack is powerful and realistic. In contrast, all previously presented threshold certificateless public key cryptosystems are proven secure against the more idealized static adversaries only. They choose and fix the subset of target players before running the protocol. We also prove security of this scheme in the random oracle model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Canetti R, Gennaro R, Jarecki S, et al. Adaptive security for threshold cryptosystems [C]//Proc of Crypto’99. Heidelberg: Springer-Verlag, 1999: 98–166.

    Google Scholar 

  2. Shamir A. Identity based cryptosystems and signature schemes [C]//Proc of Crypto’84. Heidelberg: Springer-Verlag, 1984: 47–53.

    Google Scholar 

  3. Boneh D, Franklin M. Identity-based encryption from the weil pairing [J]. SIAM Journal of Computing, 2003, 32(3): 586–615.

    Article  MATH  MathSciNet  Google Scholar 

  4. Oh J, Lee K, Moon S. How to solve key escrow and identity revocation in identity based encryption schemes [C]//Proc of ICISS05. Heidelberg: Springer-Verlag, 2005: 290–303.

    Google Scholar 

  5. Al-Riyami S S, Paterson K G. Certificateless public key cryptography [C]//Proc of Asiacrypt2003. Heidelberg: Springer-Verlag, 2003: 452–473.

    Google Scholar 

  6. Long Y, Chen K F, Gong Z. Efficient chosenciphertext secure certificateless threshold key encapsulation mechanism [C]//Proc of China Cryptography Conference 07. Chengdu: SWJU Press, 2007: 86–94.

    Google Scholar 

  7. Shamir A. How to share a secret [J]. Communications of the ACM, 1979, 22(11): 612–613.

    Article  MATH  MathSciNet  Google Scholar 

  8. Desmedt Y, Frankel Y. Threshold cryptosystems [C]//Proc of Crypto’89. Heidelberg: Springer-Verlag, 1990: 307–315.

    Google Scholar 

  9. Shoup V, Gennaro R. Securing threshold cryptosystems against chosen ciphertext attack [C]//Proc of Eurocrypt’98. Heidelberg: Springer-Verlag, 1999: 1–16.

    Google Scholar 

  10. Fouque P, Pointcheval D. Threshold cryptosystems secure against the chosen-cihertext attacks [C]//Proc of Asiacrypt2001. Heidelberg: Springer-Verlag, 2001: 351–368.

    Google Scholar 

  11. Pedersen T. A threshold cryptosystem without a trusted party [C]//Proc of Eurocrypt’91. Heidelberg: Springer-Verlag, 1991: 129–140.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu Long  (龙 宇).

Additional information

Foundation item: the National Basic Research Program (973) of China (No. 2007CB311201) and the National High Technology Research and Development Program (863) of China (Nos. 2006AA01Z422, 2007AA01Z456)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Long, Y., Li, Xx., Chen, Kf. et al. Distributed certificateless key encapsulation mechanism secure against the adaptive adversary. J. Shanghai Jiaotong Univ. (Sci.) 14, 102–106 (2009). https://doi.org/10.1007/s12204-009-0102-7

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12204-009-0102-7

Key words

CLC number

Navigation