General and Efficient Certificateless Public Key Encryption Constructions

  • Zhaohui Cheng
  • Liqun Chen
  • Li Ling
  • Richard Comley
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4575)


In 2003, Al-Riyami and Paterson introduced a new public key encryption paradigm called Certificateless Public Key Encryption (CL-PKE), which like Identity-Based Encryption (IBE) is certificatefree, and meanwhile which unlike IBE but similar to certificate-based encryption is key-escrow-free. In this paper, based on a heuristic observation on some existing IBE schemes and PKE schemes, we propose a general approach to build a CL-PKE solution, which makes use of a simple combination of an IBE scheme, a Diffie-Hellman type key establishment algorithm and a secure hash-function. Following this approach we construct two efficient concrete CL-PKE schemes and formally analyse their security in the random oracle model.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Al-Riyami, S.: Cryptographic schemes based on elliptic curve pairings. PhD thesis, Royal Holloway, University of London (2004)Google Scholar
  2. 2.
    Au, M.H., Chen, J., Liu, J.K., et al.: Malicious KGC attack in certificateless cryptography. Cryptology ePrint Archive, Report 2006/255Google Scholar
  3. 3.
    Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)Google Scholar
  4. 4.
    Al-Riyami, S.S., Paterson, K.G.: CBE from CL-PKE: a generic construction and efficient schemes. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 398–415. Springer, Heidelberg (2005)Google Scholar
  5. 5.
    Boyen, X.: The BB 1 identity-based cryptosystem: a standard for encryption and key encapsulation (August 2006)
  6. 6.
    Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  7. 7.
    Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic constructions of identity-based and certificateless KEMs. Cryptology ePrint Archive, Report 2005/058 (2005)Google Scholar
  8. 8.
    Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 134–148. Springer, Heidelberg (2005)Google Scholar
  9. 9.
    Cheng, Z.: Pairing-based cryptosystems and key agreement protocols. Thesis, Middlesex University (2007)Google Scholar
  10. 10.
    Cheng, Z., Comley, R.: Efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/012 (2005)Google Scholar
  11. 11.
    Chen, L., Cheng, Z.: Security proof of the Sakai-Kasahara’s identity-based encryption scheme. In: Fukś, H., Lukosch, S., Salgado, A.C. (eds.) CRIWG 2005. LNCS, vol. 3706, pp. 442–459. Springer, Heidelberg (2005)Google Scholar
  12. 12.
    Chen, L., Cheng, Z., Malone-Lee, J., Smart, N.: An efficient ID-KEM based on the Sakai–Kasahara key construction. IEE Proc. Information Security 153(1), 19–26 (2006)CrossRefGoogle Scholar
  13. 13.
    Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing 33, 167–226 (2003)MATHCrossRefMathSciNetGoogle Scholar
  14. 14.
    Dent, A.: A Survey of certificateless encryption schemes and security models. Cryptology ePrint Archive, Report 2006/211 (2006)Google Scholar
  15. 15.
    Dent, A., Libert, B., Paterson, K.: Certificateless encryption schemes strongly secure in the standard model. Cryptology ePrint Archive, Report 2007/121 (2007)Google Scholar
  16. 16.
    ElGamal, T.: A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31, 469–472 (1985)MATHCrossRefMathSciNetGoogle Scholar
  17. 17.
    Fujisaki, E., Okamotom, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 535–554. Springer, Heidelberg (1999)Google Scholar
  18. 18.
    Fujisaki, E., Okamoto, T.: How to enhance the security of public-key encryption at minimum cost. IEICE Trans. Fund E83-9(1), 24–32 (2000)Google Scholar
  19. 19.
    Girault, M.: Self-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 490–497. Springer, Heidelberg (1992)Google Scholar
  20. 20.
    Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) Advances in Cryptology – EUROCRPYT 2003. LNCS, vol. 2656, pp. 272–293. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  21. 21.
    Galindo, D.: Boneh-Franklin identity based encryption revisited. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 791–802. Springer, Heidelberg (2005)Google Scholar
  22. 22.
    Galindo, D., Morillo, P., Ráfols, C.: Breaking Yum and Lee generic constructions of certificate-less and certificate-based encryption schemes. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol. 4043, pp. 81–91. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  23. 23.
    Granger, R., Page, D., Smart, N.P.: High security pairing-based cryptography revisited. In: Hess, F., Pauli, S., Pohst, M. (eds.) Algorithmic Number Theory. LNCS, vol. 4076, pp. 480–494. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  24. 24.
    Huang, Q., Wong, D.S.: Generic certificateless encryption in the standard model. Cryptology ePrint Archive, Report 2007/095Google Scholar
  25. 25.
    Libert, B., Quisquater, J.-J.: On constructing certificateless cryptosystems from identity based encryption. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 474–490. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  26. 26.
    Kitagawa, T., Yang, P., Hanaoka, G., et al.: Generic transforms to acquire CCA-Security for identity based encryption: the cases of FOpkc and REACT. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 348–359. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  27. 27.
    Okamoto, T., Pointcheval, D.: REACT: rapid enhanced-security asymmetric cryptosystem transform. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, p. 159. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  28. 28.
    Shi, Y., Li, J., Pan, J., Shi, J.: Efficient certificateless public key encryption with pairing. In: Proc. of Networks and Communication Systems 2006 (2006)Google Scholar
  29. 29.
    Yum, D.H., Lee, P.J.: Generic construction of certificateless encryption. In: Laganà, A., Gavrilova, M., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 802–811. Springer, Heidelberg (2004)Google Scholar
  30. 30.
    Yum, D.H., Lee, P.J.: Identity-based cryptography in public key management. In: Katsikas, S.K., Gritzalis, S., Lopez, J. (eds.) EuroPKI 2004. LNCS, vol. 3093, pp. 71–84. Springer, Heidelberg (2004)Google Scholar
  31. 31.
    Yang, P., Kitagawa, T., Hanaoka, G., et al.: Applying Fujisaki-Okamoto to identity-based encryption. In: Fossorier, M.P.C., Imai, H., Lin, S., Poli, A. (eds.) Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. LNCS, vol. 3857, pp. 183–192. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  32. 32.
    Zhang, Z., Feng, D.: On the security of a certificateless public-key encryption. Cryptology ePrint Archive, Report 2005/426Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Zhaohui Cheng
    • 1
  • Liqun Chen
    • 2
  • Li Ling
    • 3
  • Richard Comley
    • 1
  1. 1.School of Computing Science, Middlesex University, LondonUK
  2. 2.Hewlett-Packard Laboratories, BristolUK
  3. 3.Department of Communication Science and Engineering, Fudan University, ShanghaiChina

Personalised recommendations