2005
DOI: 10.1007/11556992_10
|View full text |Cite
|
Sign up to set email alerts
|

Certificateless Public Key Encryption Without Pairing

Abstract: Abstract. "Certificateless Public Key Cryptography" has very appealing features, namely it does not require any public key certification (cf. traditional Public Key Cryptography) nor having key escrow problem (cf. Identity-Based Cryptography). Unfortunately, construction of Certificateless Public Key Encryption (CLPKE) schemes has so far depended on the use of Identity-Based Encryption, which results in the bilinear pairing-based schemes that need costly operations. In this paper, we consider a relaxation of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
132
0
4

Year Published

2006
2006
2016
2016

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 181 publications
(142 citation statements)
references
References 17 publications
1
132
0
4
Order By: Relevance
“…The recent pairing-free scheme of Baek et al [4] fits a slightly different model where users have to obtain their partial private key and a partial public key before generating their full public key. This approach is closer to the "self-certified" paradigm [23] which is another approach suggested by Girault in 1991 to use public key cryptography without traditional digital certificates and without involving an escrow authority.…”
Section: Definition Of Certificatelessmentioning
confidence: 99%
See 4 more Smart Citations
“…The recent pairing-free scheme of Baek et al [4] fits a slightly different model where users have to obtain their partial private key and a partial public key before generating their full public key. This approach is closer to the "self-certified" paradigm [23] which is another approach suggested by Girault in 1991 to use public key cryptography without traditional digital certificates and without involving an escrow authority.…”
Section: Definition Of Certificatelessmentioning
confidence: 99%
“…The security models considered in [4,16,29] are weaker in that they disallow Type I attackers to ever extract the partial private key of the target entity. In contrast, the above model allows them to do so as long as they do not additionally replace the associated public key.…”
Section: A Eventually Outputs a Bit B And Wins If B = B As Usual Hementioning
confidence: 99%
See 3 more Smart Citations