2006
DOI: 10.1007/11745853_31
|View full text |Cite
|
Sign up to set email alerts
|

On Constructing Certificateless Cryptosystems from Identity Based Encryption

Abstract: Abstract. Certificateless cryptography (CL-PKC) is a concept that aims at enjoying the advantages of identity based cryptography without suffering from its inherent key escrow. Several methods were recently suggested to generically construct a certificateless encryption (CLE) scheme by combining identity based schemes with ordinary public key cryptosystems. Whilst the security of one of these generic compositions was proved in a relaxed security model, we show that all them are insecure against chosen-cipherte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
123
0
8

Year Published

2006
2006
2017
2017

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 123 publications
(137 citation statements)
references
References 30 publications
(94 reference statements)
0
123
0
8
Order By: Relevance
“…Finally, as in the proof of Theorem 1, the signature (z 1 , z 2 , z 3 , z 4 , z 5 , z 6 , c j ) is valid and can pass the verification. we can obtain the equation…”
mentioning
confidence: 90%
See 1 more Smart Citation
“…Finally, as in the proof of Theorem 1, the signature (z 1 , z 2 , z 3 , z 4 , z 5 , z 6 , c j ) is valid and can pass the verification. we can obtain the equation…”
mentioning
confidence: 90%
“…In addition, the user independently generates and publishes the public key, so the need of certificates in conventional PKC is abolished. Afterwards, numerous works [4][5][6][7][8][9] have addressed the CL-PKC area.…”
Section: Introductionmentioning
confidence: 99%
“…Some concrete efficient implementations were proposed in [8,9]. In addition, some generic construction were proposed in [7,5,6].…”
Section: Introductionmentioning
confidence: 99%
“…Like ID-PKC, certificateless cryptography does not use public key certificate [1,11,18], it also needs a third party called Key Generation Center (KGC) to help a user to generate his private key. However, the KGC does not have access to a user's full private key.…”
Section: Introductionmentioning
confidence: 99%