2007
DOI: 10.1007/978-3-540-71677-8_31
|View full text |Cite
|
Sign up to set email alerts
|

Self-Generated-Certificate Public Key Encryption Without Pairing

Abstract: Abstract. Certificateless Public Key Cryptography (CL-PKC) has very appealing features, namely it does not require any public key certification (cf. traditional Public Key Cryptography) nor having key escrow problem (cf. Identity-Based Cryptography). However, it does suffer to the Denialof-Decryption (DoD) Attack called by Liu and Au [1], as its nature is similar to the well known Denial-of-Service (DoS) Attack. Based on CL-PKC, they introduced a new paradigm called Self-Generated-Certificate Public Key Crypto… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0
1

Year Published

2008
2008
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 37 publications
(31 citation statements)
references
References 12 publications
0
30
0
1
Order By: Relevance
“…A subtle change is that our user key generation algorithm KGen only takes the system parameter as input but not the identifier. In some CLE schemes [2,25,28, 31] the inclusion of the identifier, or the trapdoor for an identifier, is essential for the generation of the user public key. For these schemes, KGen can be executed only after Extract, so straightforward adaption results in inefficient TREs in which the size of the user public key grows linearly with the number of supported time periods.…”
Section: Discussion On Our Choices For Definitionmentioning
confidence: 99%
See 3 more Smart Citations
“…A subtle change is that our user key generation algorithm KGen only takes the system parameter as input but not the identifier. In some CLE schemes [2,25,28, 31] the inclusion of the identifier, or the trapdoor for an identifier, is essential for the generation of the user public key. For these schemes, KGen can be executed only after Extract, so straightforward adaption results in inefficient TREs in which the size of the user public key grows linearly with the number of supported time periods.…”
Section: Discussion On Our Choices For Definitionmentioning
confidence: 99%
“…[18]), the user secret key cannot be recovered from the trapdoor and the full private key. Moreover, some CLE formulations [2,25,31] do not have user secret keys at all. In TRE, user secret keys are held by each user, which makes it impossible to reduce the security of TRE to that of CLE.…”
Section: The Difficulty Of Converting Between Cle and Trementioning
confidence: 99%
See 2 more Smart Citations
“…The cryptographic techniques involve the application of traditional algorithms such as Diffie-Hellman, RSA and elliptic curve cryptography [33]. Other cryptographic methods that have been adapted especially for wireless ad hoc networks include the use of threshold cryptography in ad hoc networks to develop a key management service [34], extensible authentication protocol-transport layer based security authentication with the use of asymmetric cryptography [35], public-key cryptosystems based on chaotic dynamics [36] as well as self-generated-certificate public key encryption for wireless ad hoc networks [37]. There are, however, several shortcomings related to public key cryptography such as increased complexity in protocol design, vulnerability to denial of service (DoS) attacks during the four-step handshake as well as the lack of effective user identity protection mechanisms [38].…”
Section: Cryptographic Methodsmentioning
confidence: 99%