Certificateless cryptography with KGC trust level 3

A normal certificateless cryptosystem can only achieve KGC trust level 2 according to the trust hierarchy defined by Girault. Although in the seminal paper introducing certificateless cryptography, Al-Riyami and Paterson introduced a binding technique to lift the KGC trust level of their certificate...

Full description

Saved in:
Bibliographic Details
Main Authors: YANG, Guomin, TAN, Chik How
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2011
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7441
https://ink.library.smu.edu.sg/context/sis_research/article/8444/viewcontent/1_s2.0_S0304397511005081_main.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-8444
record_format dspace
spelling sg-smu-ink.sis_research-84442022-10-20T07:46:12Z Certificateless cryptography with KGC trust level 3 YANG, Guomin TAN, Chik How A normal certificateless cryptosystem can only achieve KGC trust level 2 according to the trust hierarchy defined by Girault. Although in the seminal paper introducing certificateless cryptography, Al-Riyami and Paterson introduced a binding technique to lift the KGC trust level of their certificateless schemes to level 3, many subsequent work on certificateless cryptography just focused on the constructions of normal certificateless schemes, and a formal study on the general applicability of the binding technique to these existing schemes is still missing. In this paper, to address the KGC trust level issue, we introduce the notion of Key Dependent Certificateless Cryptography (KD-CLC). Compared with conventional certificateless cryptography, KD-CLC can achieve stronger security, and more importantly, KGC trust level 3. We then study generic techniques for transforming conventional CLC to KD-CLC. We start with the binding technique by Al-Riyami and Paterson, and show that there are some technical difficulties in proving that the binding technique is generally applicable. However, we show that a slightly modified version of the binding technique indeed can be proved to work under the random oracle assumption. Finally, we show how to perform the transformation using a standard cryptographic primitive instead of a random oracle. 2011-09-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7441 info:doi/10.1016/j.tcs.2011.06.015 https://ink.library.smu.edu.sg/context/sis_research/article/8444/viewcontent/1_s2.0_S0304397511005081_main.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Certificateless cryptography Public key encryption Digital signature Trust hierarchy Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Certificateless cryptography
Public key encryption
Digital signature
Trust hierarchy
Information Security
spellingShingle Certificateless cryptography
Public key encryption
Digital signature
Trust hierarchy
Information Security
YANG, Guomin
TAN, Chik How
Certificateless cryptography with KGC trust level 3
description A normal certificateless cryptosystem can only achieve KGC trust level 2 according to the trust hierarchy defined by Girault. Although in the seminal paper introducing certificateless cryptography, Al-Riyami and Paterson introduced a binding technique to lift the KGC trust level of their certificateless schemes to level 3, many subsequent work on certificateless cryptography just focused on the constructions of normal certificateless schemes, and a formal study on the general applicability of the binding technique to these existing schemes is still missing. In this paper, to address the KGC trust level issue, we introduce the notion of Key Dependent Certificateless Cryptography (KD-CLC). Compared with conventional certificateless cryptography, KD-CLC can achieve stronger security, and more importantly, KGC trust level 3. We then study generic techniques for transforming conventional CLC to KD-CLC. We start with the binding technique by Al-Riyami and Paterson, and show that there are some technical difficulties in proving that the binding technique is generally applicable. However, we show that a slightly modified version of the binding technique indeed can be proved to work under the random oracle assumption. Finally, we show how to perform the transformation using a standard cryptographic primitive instead of a random oracle.
format text
author YANG, Guomin
TAN, Chik How
author_facet YANG, Guomin
TAN, Chik How
author_sort YANG, Guomin
title Certificateless cryptography with KGC trust level 3
title_short Certificateless cryptography with KGC trust level 3
title_full Certificateless cryptography with KGC trust level 3
title_fullStr Certificateless cryptography with KGC trust level 3
title_full_unstemmed Certificateless cryptography with KGC trust level 3
title_sort certificateless cryptography with kgc trust level 3
publisher Institutional Knowledge at Singapore Management University
publishDate 2011
url https://ink.library.smu.edu.sg/sis_research/7441
https://ink.library.smu.edu.sg/context/sis_research/article/8444/viewcontent/1_s2.0_S0304397511005081_main.pdf
_version_ 1770576350152753152