File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1145/1229285.1266994
- Scopus: eid_2-s2.0-84876341103
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model
Title | Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model |
---|---|
Authors | |
Keywords | Certificateless signature Certificateless encryption |
Issue Date | 2007 |
Citation | eProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07, 2007, p. 273-283 How to Cite? |
Abstract | Certificateless Public Key Cryptography (CL-PKC) enjoys a number of features of Identity-Based Cryptography (IBC) while without having the problem of key escrow. However, it does suffer from an attack where the adversary, Carol, replaces Alice's public key by someone's public key so that Bob, who wants to send an encrypted message to Alice, uses Alice's identity and other's public key as the inputs to the encryption function. As a result, Alice cannot decrypt the message while Bob is unaware of this. We call it Denial-of-Decryption (DoD) Attack as its nature is similar to the well known Denial-of-Service (DoS) Attack. Based on CL-PKC, we propose a new paradigm called Self-Generated-Certificate Public Key Cryptography (SGC-PKC) that captures the DoD Attack. We also provide a generic construction of a self-generated-certificate public key encryption scheme in the standard model. Our generic construction uses certificateless signature and certificateless encryption as the building block. In addition, we further propose a certificateless signature and a certificateless encryption scheme with concrete implementation that are all provably secure in the standard model, which are the first in the literature regardless of the generic constructions by Yum and Lee which may contain security weaknesses as pointed out by others. We believe these concrete implementations are of independent interest. Copyright 2007 ACM. |
Persistent Identifier | http://hdl.handle.net/10722/280741 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Liu, Joseph K. | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Susilo, Willy | - |
dc.date.accessioned | 2020-02-17T14:34:49Z | - |
dc.date.available | 2020-02-17T14:34:49Z | - |
dc.date.issued | 2007 | - |
dc.identifier.citation | eProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07, 2007, p. 273-283 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280741 | - |
dc.description.abstract | Certificateless Public Key Cryptography (CL-PKC) enjoys a number of features of Identity-Based Cryptography (IBC) while without having the problem of key escrow. However, it does suffer from an attack where the adversary, Carol, replaces Alice's public key by someone's public key so that Bob, who wants to send an encrypted message to Alice, uses Alice's identity and other's public key as the inputs to the encryption function. As a result, Alice cannot decrypt the message while Bob is unaware of this. We call it Denial-of-Decryption (DoD) Attack as its nature is similar to the well known Denial-of-Service (DoS) Attack. Based on CL-PKC, we propose a new paradigm called Self-Generated-Certificate Public Key Cryptography (SGC-PKC) that captures the DoD Attack. We also provide a generic construction of a self-generated-certificate public key encryption scheme in the standard model. Our generic construction uses certificateless signature and certificateless encryption as the building block. In addition, we further propose a certificateless signature and a certificateless encryption scheme with concrete implementation that are all provably secure in the standard model, which are the first in the literature regardless of the generic constructions by Yum and Lee which may contain security weaknesses as pointed out by others. We believe these concrete implementations are of independent interest. Copyright 2007 ACM. | - |
dc.language | eng | - |
dc.relation.ispartof | eProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07 | - |
dc.subject | Certificateless signature | - |
dc.subject | Certificateless encryption | - |
dc.title | Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1145/1229285.1266994 | - |
dc.identifier.scopus | eid_2-s2.0-84876341103 | - |
dc.identifier.spage | 273 | - |
dc.identifier.epage | 283 | - |