ABSTRACT
Certificateless cryptography inherits a solution to the certificate management problem in public-key encryption from identity-based techniques, whilst removing the secret key escrow functionality inherent to the identity-based setting. Signcryption schemes achieve confidentiality and authentication simultaneously by combining public-key encryption and digital signatures, offering better overall performance and security. In this paper, we introduce the notion of certificateless signcryption and present an efficient construction which guarantees security under insider attacks, and therefore provides forward secrecy and non-repudiation.
- S. S. Al-Riyami and K. G. Paterson. Certificateless Public-Key Cryptography. Advances in Cryptology - ASIACRYPT 2003, LNCS 2894:452--473. Springer-Verlag, 2003.Google ScholarCross Ref
- J. H. An, Y. Dodis and T. Rabin. On the Security of Joint Signature and Encryption. Advances in Cryptology - EUROCRYPT 2002, LNCS 2332:83--107. Springer-Verlag, 2002. Google ScholarDigital Library
- Z. Cheng and R. Comley. Efficient Certificateless Public Key Encryption. Cryptology ePrint Archive, Report 2005/012. 2005.Google Scholar
- A. W. Dent. A Survey of Certificateless Encryption Schemes and Security Models. Cryptology ePrint Archive, Report 2006/211. 2006.Google Scholar
- X. Huang, W. Susilo, Y. Mu and F. Zhang. On the Security of Certificateless Signature Schemes from Asiacrypt 2003. Cryptology and Network Security - CANS 2005, LNCS 3810:13--25. Springer-Verlag, 2005. Google ScholarDigital Library
- B. Libert and J.-J. Quisquater. On Constructing Certificateless Cryptosystems from Identity-Based Encryption. Public Key Cryptography 2006 - PKC 2006, LNCS 3958:474--490. Springer-Verlag, 2006. Google ScholarDigital Library
- B. Libert and J.-J. Quisquater. The Exact Security of an Identity Based Signature and its Applications. Cryptology ePrint Archive, Report 2004/102. 2004.Google Scholar
- Z. Zhang, D. S. Wong, J. Xu and D. Feng. Certificateless Public-Key Signature: Security Model and Efficient Construction. 4th International Conference on Applied Cryptography and Network Security - ACNS 2006, LNCS 3989:293--308. Springer-Verlag, 2006. Google ScholarDigital Library
- Y. Zheng. Digital Signcryption or How to Achieve Cost(Signature & Encryption) <<< Cost(Signature) + Cost(Encryption). Advances in Cryptology - CRYPTO 97, LNCS 1294:165--179, Springer-Verlag, 1997. Google ScholarDigital Library
Recommendations
An Enhanced Certificateless Signcryption in the Standard Model
Signcryption is a cryptography prototype which performs message encryption and signature in a logical step. Certificateless public key cryptography successfully resolves the problem of certificate management in traditional public key cryptography and ...
A New Efficient Certificateless Signcryption Scheme
ISISE '08: Proceedings of the 2008 International Symposium on Information Science and Engieering - Volume 01Certificateless public key cryptosystem overcomes the problem of the certificate management in the certificate-based public key cryptosystem and the inherent key escrow problem in the identity-based public key cryptosystem. Signcryption is a ...
Efficient and Provably Secure Certificateless Multi-receiver Signcryption
ProvSec '08: Proceedings of the 2nd International Conference on Provable SecurityCertificateless cryptography aims at combining the advantages of identity based and public key cryptography, so as to avoid the key escrow problem inherent in the identity based system and cumbersome certificate management in public key infrastructure. ...
Comments