skip to main content
10.1145/2435349.2435375acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
poster

An efficient certificateless cryptography scheme without pairing

Published: 18 February 2013 Publication History

Abstract

We propose a mediated certificateless encryption scheme without pairing operations. Mediated certificateless public key encryption (mCL-PKE) solves the key escrow problem in identity based encryption and certificate revocation problem in public key cryptography. However, existing mCL-PKE schemes are either inefficient because of the use of expensive pairing operations or vulnerable against partial decryption attacks. In order to address the performance and security issues, in this poster, we propose a novel mCL-PKE scheme. We implement our mCL-PKE scheme and a recent scheme, and evaluate the security and performance. Our results show that our algorithms are efficient and practical.

References

[1]
S. Al-Riyami and K. Paterson. Certificateless public key cryptography. In C.-S. Laih, editor, ASIACRYPT '03, volume 2894, pages 452--473. 2003.
[2]
R. Canetti and S. Hohenberger. Chosen-ciphertext secure proxy re-encryption. In CCS '07, pages 185--194, 2007.
[3]
L. P. Deutsch. MD5 hash function. http://sourceforge.net/projects/libmd5-rfc/files/.
[4]
The gnu multiple precision arithmetic library. http://gmplib.org/.
[5]
X. W. Lei Xu and X. Zhang. CL-PKE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In CCS '12.
[6]
B. Lynn. Pairing-based cryptography. http://crypto.stanford.edu/pbc.
[7]
G. Miklau and D. Suciu. Controlling access to published data using cryptography. In VLDB '03, pages 898--909. VLDB Endowment, 2003.
[8]
M. Nabeel, N. Shang, and E. Bertino. Privacy preserving policy based content sharing in public clouds. TKDE, 2012.
[9]
V. Shoup. NTL library for doing number theory. http://www.shoup.net/ntl/.

Cited By

View all
  • (2021)Cryptanalysis of a Pairing-free Certificateless Signcryption schemeICT Express10.1016/j.icte.2020.07.0067:2(200-204)Online publication date: Jun-2021
  • (2019)Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIEEE Transactions on Services Computing10.1109/TSC.2018.285316712:5(762-771)Online publication date: 1-Sep-2019
  • (2018)Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT DevicesIEEE Transactions on Mobile Computing10.1109/TMC.2017.273974217:4(927-944)Online publication date: 1-Apr-2018
  • Show More Cited By

Index Terms

  1. An efficient certificateless cryptography scheme without pairing

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CODASPY '13: Proceedings of the third ACM conference on Data and application security and privacy
    February 2013
    400 pages
    ISBN:9781450318907
    DOI:10.1145/2435349
    • General Chairs:
    • Elisa Bertino,
    • Ravi Sandhu,
    • Program Chair:
    • Lujo Bauer,
    • Publications Chair:
    • Jaehong Park
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 February 2013

    Check for updates

    Author Tags

    1. access control
    2. certificateless cryptography
    3. confidentiality
    4. key management

    Qualifiers

    • Poster

    Conference

    CODASPY'13
    Sponsor:

    Acceptance Rates

    CODASPY '13 Paper Acceptance Rate 24 of 107 submissions, 22%;
    Overall Acceptance Rate 149 of 789 submissions, 19%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 01 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Cryptanalysis of a Pairing-free Certificateless Signcryption schemeICT Express10.1016/j.icte.2020.07.0067:2(200-204)Online publication date: Jun-2021
    • (2019)Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIEEE Transactions on Services Computing10.1109/TSC.2018.285316712:5(762-771)Online publication date: 1-Sep-2019
    • (2018)Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT DevicesIEEE Transactions on Mobile Computing10.1109/TMC.2017.273974217:4(927-944)Online publication date: 1-Apr-2018
    • (2017)SeamBlue: Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT DevicesProceedings of the 2017 International Conference on Embedded Wireless Systems and Networks10.5555/3108009.3108027(132-143)Online publication date: 20-Feb-2017

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media