Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
SIAM Journal on Computing
Foundations of Cryptography: Volume 2, Basic Applications
Foundations of Cryptography: Volume 2, Basic Applications
Certificateless signature: a new security model and an improved generic construction
Designs, Codes and Cryptography
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Malicious KGC attacks in certificateless cryptography
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Chosen-Ciphertext Security from Identity-Based Encryption
SIAM Journal on Computing
Lower bounds for discrete logarithms and related problems
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
On the security of certificateless signature schemes from asiacrypt 2003
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Improved efficiency for CCA-secure cryptosystems built using identity-based encryption
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Chosen-ciphertext security of multiple encryption
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
On constructing certificateless cryptosystems from identity based encryption
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Key replacement attack against a generic construction of certificateless signature
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
On the relation among various security models for certificateless cryptography
International Journal of Applied Cryptography
An Improved Certificateless Signature Scheme Secure in the Standard Model
Fundamenta Informaticae
RSA-Based Certificateless Public Key Encryption
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Further Observations on Certificateless Public Key Encryption
Information Security and Cryptology
Certificateless Signature Scheme without Random Oracles
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Certificateless Threshold Ring Signature
Information Sciences: an International Journal
Certificateless encryption schemes strongly secure in the standard model
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Cryptanalysis of a certificateless signcryption scheme in the standard model
Information Sciences: an International Journal
Certificateless public key encryption: A new generic construction and two pairing-free schemes
Theoretical Computer Science
Journal of Computer Science and Technology
Strongly secure certificateless key exchange without pairing
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
An efficient RSA-based certificateless signature scheme
Journal of Systems and Software
An Improved Certificateless Signature Scheme Secure in the Standard Model
Fundamenta Informaticae
Practical certificateless public key encryption in the standard model
NSS'12 Proceedings of the 6th international conference on Network and System Security
Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model
Information Sciences: an International Journal
Cryptanalysis and improvement of a certificateless encryption scheme in the standard model
Frontiers of Computer Science: Selected Publications from Chinese Universities
Hi-index | 0.00 |
Despite the large number of certificateless encryption schemes recently proposed, many of them have been found to be insecure under a practical attack called malicious-but-passive KGC attack, since they all follow the same key generation procedure as that of the one proposed by Al-Riyami and Paterson in ASIACRYPT 2003. The only scheme that remains secure against this attack is due to Libert and Quisquater (PKC 2006). However, the security can only be shown in the random oracle model. In this paper, we first show that a scheme which has a different key generation procedure from that of Al-Riyami and Paterson also suffers from the malicious-but-passive KGC attack. Our attacking techniques are different and may cause greater extent of damage than the previous ones. We also propose a generic construction of certificateless encryption which can be proven secure against this attack in the standard model. This generic scheme not only is the first one proven secure in the standard model, but is also very efficient to instantiate. We also describe how to use short signature and hybrid encryption to construct highly efficient instantiations of this generic scheme.