General and Efficient Certificateless Public Key Encryption Constructions

  • Zhaohui Cheng
  • Liqun Chen
  • Li Ling
  • Richard Comley
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4575)

Abstract

In 2003, Al-Riyami and Paterson introduced a new public key encryption paradigm called Certificateless Public Key Encryption (CL-PKE), which like Identity-Based Encryption (IBE) is certificatefree, and meanwhile which unlike IBE but similar to certificate-based encryption is key-escrow-free. In this paper, based on a heuristic observation on some existing IBE schemes and PKE schemes, we propose a general approach to build a CL-PKE solution, which makes use of a simple combination of an IBE scheme, a Diffie-Hellman type key establishment algorithm and a secure hash-function. Following this approach we construct two efficient concrete CL-PKE schemes and formally analyse their security in the random oracle model.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Al-Riyami, S.: Cryptographic schemes based on elliptic curve pairings. PhD thesis, Royal Holloway, University of London (2004)Google Scholar
  2. 2.
    Au, M.H., Chen, J., Liu, J.K., et al.: Malicious KGC attack in certificateless cryptography. Cryptology ePrint Archive, Report 2006/255Google Scholar
  3. 3.
    Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)Google Scholar
  4. 4.
    Al-Riyami, S.S., Paterson, K.G.: CBE from CL-PKE: a generic construction and efficient schemes. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 398–415. Springer, Heidelberg (2005)Google Scholar
  5. 5.
    Boyen, X.: The BB 1 identity-based cryptosystem: a standard for encryption and key encapsulation (August 2006) http://grouper.ieee.org/groups/1363/IBC/submissions/Boyen-bb1_ieee.pdf
  6. 6.
    Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  7. 7.
    Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic constructions of identity-based and certificateless KEMs. Cryptology ePrint Archive, Report 2005/058 (2005)Google Scholar
  8. 8.
    Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 134–148. Springer, Heidelberg (2005)Google Scholar
  9. 9.
    Cheng, Z.: Pairing-based cryptosystems and key agreement protocols. Thesis, Middlesex University (2007)Google Scholar
  10. 10.
    Cheng, Z., Comley, R.: Efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/012 (2005)Google Scholar
  11. 11.
    Chen, L., Cheng, Z.: Security proof of the Sakai-Kasahara’s identity-based encryption scheme. In: Fukś, H., Lukosch, S., Salgado, A.C. (eds.) CRIWG 2005. LNCS, vol. 3706, pp. 442–459. Springer, Heidelberg (2005)Google Scholar
  12. 12.
    Chen, L., Cheng, Z., Malone-Lee, J., Smart, N.: An efficient ID-KEM based on the Sakai–Kasahara key construction. IEE Proc. Information Security 153(1), 19–26 (2006)CrossRefGoogle Scholar
  13. 13.
    Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing 33, 167–226 (2003)MATHCrossRefMathSciNetGoogle Scholar
  14. 14.
    Dent, A.: A Survey of certificateless encryption schemes and security models. Cryptology ePrint Archive, Report 2006/211 (2006)Google Scholar
  15. 15.
    Dent, A., Libert, B., Paterson, K.: Certificateless encryption schemes strongly secure in the standard model. Cryptology ePrint Archive, Report 2007/121 (2007)Google Scholar
  16. 16.
    ElGamal, T.: A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31, 469–472 (1985)MATHCrossRefMathSciNetGoogle Scholar
  17. 17.
    Fujisaki, E., Okamotom, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 535–554. Springer, Heidelberg (1999)Google Scholar
  18. 18.
    Fujisaki, E., Okamoto, T.: How to enhance the security of public-key encryption at minimum cost. IEICE Trans. Fund E83-9(1), 24–32 (2000)Google Scholar
  19. 19.
    Girault, M.: Self-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 490–497. Springer, Heidelberg (1992)Google Scholar
  20. 20.
    Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) Advances in Cryptology – EUROCRPYT 2003. LNCS, vol. 2656, pp. 272–293. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  21. 21.
    Galindo, D.: Boneh-Franklin identity based encryption revisited. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 791–802. Springer, Heidelberg (2005)Google Scholar
  22. 22.
    Galindo, D., Morillo, P., Ráfols, C.: Breaking Yum and Lee generic constructions of certificate-less and certificate-based encryption schemes. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol. 4043, pp. 81–91. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  23. 23.
    Granger, R., Page, D., Smart, N.P.: High security pairing-based cryptography revisited. In: Hess, F., Pauli, S., Pohst, M. (eds.) Algorithmic Number Theory. LNCS, vol. 4076, pp. 480–494. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  24. 24.
    Huang, Q., Wong, D.S.: Generic certificateless encryption in the standard model. Cryptology ePrint Archive, Report 2007/095Google Scholar
  25. 25.
    Libert, B., Quisquater, J.-J.: On constructing certificateless cryptosystems from identity based encryption. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 474–490. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  26. 26.
    Kitagawa, T., Yang, P., Hanaoka, G., et al.: Generic transforms to acquire CCA-Security for identity based encryption: the cases of FOpkc and REACT. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 348–359. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  27. 27.
    Okamoto, T., Pointcheval, D.: REACT: rapid enhanced-security asymmetric cryptosystem transform. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, p. 159. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  28. 28.
    Shi, Y., Li, J., Pan, J., Shi, J.: Efficient certificateless public key encryption with pairing. In: Proc. of Networks and Communication Systems 2006 (2006)Google Scholar
  29. 29.
    Yum, D.H., Lee, P.J.: Generic construction of certificateless encryption. In: Laganà, A., Gavrilova, M., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 802–811. Springer, Heidelberg (2004)Google Scholar
  30. 30.
    Yum, D.H., Lee, P.J.: Identity-based cryptography in public key management. In: Katsikas, S.K., Gritzalis, S., Lopez, J. (eds.) EuroPKI 2004. LNCS, vol. 3093, pp. 71–84. Springer, Heidelberg (2004)Google Scholar
  31. 31.
    Yang, P., Kitagawa, T., Hanaoka, G., et al.: Applying Fujisaki-Okamoto to identity-based encryption. In: Fossorier, M.P.C., Imai, H., Lin, S., Poli, A. (eds.) Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. LNCS, vol. 3857, pp. 183–192. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  32. 32.
    Zhang, Z., Feng, D.: On the security of a certificateless public-key encryption. Cryptology ePrint Archive, Report 2005/426Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Zhaohui Cheng
    • 1
  • Liqun Chen
    • 2
  • Li Ling
    • 3
  • Richard Comley
    • 1
  1. 1.School of Computing Science, Middlesex University, LondonUK
  2. 2.Hewlett-Packard Laboratories, BristolUK
  3. 3.Department of Communication Science and Engineering, Fudan University, ShanghaiChina

Personalised recommendations