Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes
Identity-based public key cryptography is aimed at simplifying the management of certificates in traditional public key infrastructures by means of using the identity of a user as its public key. The user must identify itself to a trusted authority in order to obtain the secret key corresponding to its identity. The main drawback of this special form of public key cryptography is that it is key escrowed. Certificate-based and certificate-less cryptography have been recently proposed as intermediate paradigms between traditional and identity-based cryptography, seeking to simplify the management of certificates while avoiding the key escrow property of identity-based cryptography. In this work we cryptanalyse the certificate-based and certificate-less encryption schemes presented by Yum and Lee at EuroPKI 2004 and ICCSA 2004 conferences.
Keywordspublic-key infrastructure identity-based encryption certificate-based and certificate-less encryption cryptanalysis
Unable to display preview. Download preview PDF.
- 4.Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations Among Notions of Security for Public-Key Encryption Schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26–45. Springer, Heidelberg (1998)Google Scholar
- 5.Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic Constructions of Identity-Based and Certificateless KEMs. Cryptology ePrint Archive, Report 2005/058Google Scholar
- 9.Dent, A., Kudla, C.: On Proofs of Security for Certificateless Cryptosystems. Cryptology ePrint Archive, Report 2005/348Google Scholar
- 12.Kang, B.G., Park, J.H.: It is possible to have CBE from CL-PKE? Cryptology ePrint Archive, Report 2005/431 (2005), http://eprint.iacr.org/