Advertisement

General Certificateless Encryption and Timed-Release Encryption

  • Sherman S. M. Chow
  • Volker Roth
  • Eleanor G. Rieffel
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5229)

Abstract

While recent timed-release encryption (TRE) schemes are implicitly supported by a certificateless encryption (CLE) mechanism, the security models of CLE and TRE differ and there is no generic transformation from a CLE to a TRE. This paper gives a generalized model for CLE that fulfills the requirements of TRE. This model is secure against adversaries with adaptive trapdoor extraction capabilities, decryption capabilities for arbitrary public keys, and partial decryption capabilities. It also supports hierarchical identifiers. We propose a concrete scheme under our generalized model and prove it secure without random oracles, yielding the first strongly-secure security-mediated CLE and the first TRE in the standard model. In addition, our technique of partial decryption is different from the previous approach.

Keywords

Security-mediated certificateless encryption timed-release encryption standard model 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Al-Riyami, S.S., Paterson, K.G.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003), http://eprint.iacr.org/2003/126 Google Scholar
  2. 2.
    Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless Public Key Encryption Without Pairing. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 134–148. Springer, Heidelberg (2005)Google Scholar
  3. 3.
    Blake, I.F., Chan, A.C.-F.: Scalable, Server-Passive, User-Anonymous Timed Release Cryptography. In: ICDCS 2005, pp. 504–513. IEEE Computer Society, Los Alamitos (2005)Google Scholar
  4. 4.
    Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440–456. Springer, Heidelberg (2005)Google Scholar
  5. 5.
    Boyen, X., Mei, Q., Waters, B.: Direct Chosen Ciphertext Security from Identity-based Techniques. In: ACM CCS 2005, pp. 320–329 (2005)Google Scholar
  6. 6.
    Canetti, R., Halevi, S., Katz, J.: A Forward-Secure Public-Key Encryption Scheme. Journal of Cryptology 20(3), 265–294 (2007)zbMATHCrossRefMathSciNetGoogle Scholar
  7. 7.
    Cathalo, J., Libert, B., Quisquater, J.-J.: Efficient and Non-interactive Timed-Release Encryption. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 291–303. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  8. 8.
    Chalkias, K., Hristu-Varsakelis, D., Stephanides, G.: Improved Anonymous Timed-Release Encryption. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 311–326. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  9. 9.
    Chalkias, K., Stephanides, G.: Timed Release Cryptography from Bilinear Pairings Using Hash Chains. In: Leitold, H., Markatos, E.P. (eds.) CMS 2006. LNCS, vol. 4237, pp. 130–140. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  10. 10.
    Cheon, J.H., Hopper, N., Kim, Y., Osipkov, I.: Timed-Release and Key-Insulated Public Key Encryption. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 191–205. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  11. 11.
    Chow, S.S.M.: Token-Controlled Public Key Encryption in the Standard Model. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 315–332. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  12. 12.
    Chow, S.S.M., Boyd, C., Nieto, J.M.G.: Security-Mediated Certificateless Cryptography. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 508–524. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  13. 13.
    Chow, S.S.M., Roth, V., Rieffel, E.G.: General Certificateless Encryption and Timed-Release Encryption. Cryptology ePrint Archive, Report 2008/023 (2008) (Full Version)Google Scholar
  14. 14.
    Chow, S.S.M.: Certificateless Encryption. In: Identity-Based Cryptography. IOS Press, Amsterdam (to appear, 2008) Google Scholar
  15. 15.
    Crescenzo, G.D., Ostrovsky, R., Rajagopalan, S.: Conditional Oblivious Transfer and Timed-Release Encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 74–89. Springer, Heidelberg (1999)Google Scholar
  16. 16.
    Alexander, W., D.: A Survey of Certificateless Encryption Schemes and Security Models. Cryptology ePrint Archive, Report 2006/211 (2006)Google Scholar
  17. 17.
    Dent, A.W., Libert, B., Paterson, K.G.: Certificateless Encryption Schemes Strongly Secure in the Standard Model. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 344–359. Springer, Heidelberg (2008), http://eprint.iacr.org/2007/121 CrossRefGoogle Scholar
  18. 18.
    Dent, A.W., Tang, Q.: Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 158–174. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  19. 19.
    Gentry, C.: Practical Identity-Based Encryption Without Random Oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445–464. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  20. 20.
    Gentry, C., Silverberg, A.: Hierarchical ID-Based Cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  21. 21.
    Hristu-Varsakelis, D., Chalkias, K., Stephanides, G.: Low-cost Anonymous Timed-Release Encryption. In: Symposium on Information Assurance and Security, pp. 77–82. IEEE Computer Society, Los Alamitos (2007)Google Scholar
  22. 22.
    Hu, B.C., Wong, D.S., Zhang, Z., Deng, X.: Certificateless Signature: A New Security Model and An Improved Generic Construction. Designs, Codes and Cryptography 42(2), 109–126 (2007)zbMATHCrossRefMathSciNetGoogle Scholar
  23. 23.
    Hwang, Y.H., Yum, D.H., Lee, P.J.: Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 344–358. Springer, Heidelberg (2005)Google Scholar
  24. 24.
    Lai, J., Kou, W.: Self-Generated-Certificate Public Key Encryption Without Pairing. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 476–489. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  25. 25.
    Liu, J.K., Au, M.H., Susilo, W.: Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model. In: ASIACCS 2007. ACM, New York (2007)Google Scholar
  26. 26.
    Nali, D., Adams, C.M., Miri, A.: Hierarchical Time-based Information Release. International Journal of Information Security 5(2), 92–104 (2006)CrossRefGoogle Scholar
  27. 27.
    Park, J.H., Choi, K.Y., Hwang, J.Y., Lee, D.H.: Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles). In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 60–82. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  28. 28.
    Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock Puzzles and Timed-release Crypto. Technical Report MIT/LCS/TR-684, Massachusetts Institute of Technology (1996)Google Scholar
  29. 29.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  30. 30.
    Sun, Y., Zhang, F., Baek, J.: Strongly Secure Certificateless Public Key Encryption Without Pairing. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol. 4856, pp. 194–208. Springer, Heidelberg (2007)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Sherman S. M. Chow
    • 1
  • Volker Roth
    • 2
  • Eleanor G. Rieffel
    • 2
  1. 1.Department of Computer Science Courant Institute of Mathematical SciencesNew York UniversityUSA
  2. 2.FX Palo Alto Laboratory Palo AltoUSA

Personalised recommendations