File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model

TitleSelf-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model
Authors
KeywordsCertificateless signature
Certificateless encryption
Issue Date2007
Citation
eProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07, 2007, p. 273-283 How to Cite?
AbstractCertificateless Public Key Cryptography (CL-PKC) enjoys a number of features of Identity-Based Cryptography (IBC) while without having the problem of key escrow. However, it does suffer from an attack where the adversary, Carol, replaces Alice's public key by someone's public key so that Bob, who wants to send an encrypted message to Alice, uses Alice's identity and other's public key as the inputs to the encryption function. As a result, Alice cannot decrypt the message while Bob is unaware of this. We call it Denial-of-Decryption (DoD) Attack as its nature is similar to the well known Denial-of-Service (DoS) Attack. Based on CL-PKC, we propose a new paradigm called Self-Generated-Certificate Public Key Cryptography (SGC-PKC) that captures the DoD Attack. We also provide a generic construction of a self-generated-certificate public key encryption scheme in the standard model. Our generic construction uses certificateless signature and certificateless encryption as the building block. In addition, we further propose a certificateless signature and a certificateless encryption scheme with concrete implementation that are all provably secure in the standard model, which are the first in the literature regardless of the generic constructions by Yum and Lee which may contain security weaknesses as pointed out by others. We believe these concrete implementations are of independent interest. Copyright 2007 ACM.
Persistent Identifierhttp://hdl.handle.net/10722/280741

 

DC FieldValueLanguage
dc.contributor.authorLiu, Joseph K.-
dc.contributor.authorAu, Man Ho-
dc.contributor.authorSusilo, Willy-
dc.date.accessioned2020-02-17T14:34:49Z-
dc.date.available2020-02-17T14:34:49Z-
dc.date.issued2007-
dc.identifier.citationeProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07, 2007, p. 273-283-
dc.identifier.urihttp://hdl.handle.net/10722/280741-
dc.description.abstractCertificateless Public Key Cryptography (CL-PKC) enjoys a number of features of Identity-Based Cryptography (IBC) while without having the problem of key escrow. However, it does suffer from an attack where the adversary, Carol, replaces Alice's public key by someone's public key so that Bob, who wants to send an encrypted message to Alice, uses Alice's identity and other's public key as the inputs to the encryption function. As a result, Alice cannot decrypt the message while Bob is unaware of this. We call it Denial-of-Decryption (DoD) Attack as its nature is similar to the well known Denial-of-Service (DoS) Attack. Based on CL-PKC, we propose a new paradigm called Self-Generated-Certificate Public Key Cryptography (SGC-PKC) that captures the DoD Attack. We also provide a generic construction of a self-generated-certificate public key encryption scheme in the standard model. Our generic construction uses certificateless signature and certificateless encryption as the building block. In addition, we further propose a certificateless signature and a certificateless encryption scheme with concrete implementation that are all provably secure in the standard model, which are the first in the literature regardless of the generic constructions by Yum and Lee which may contain security weaknesses as pointed out by others. We believe these concrete implementations are of independent interest. Copyright 2007 ACM.-
dc.languageeng-
dc.relation.ispartofeProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07-
dc.subjectCertificateless signature-
dc.subjectCertificateless encryption-
dc.titleSelf-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1145/1229285.1266994-
dc.identifier.scopuseid_2-s2.0-84876341103-
dc.identifier.spage273-
dc.identifier.epage283-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats