Journal of Computer and System Sciences
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Identity-based key agreement protocols from pairings
International Journal of Information Security
A survey of certificateless encryption schemes and security models
International Journal of Information Security
Efficient One-Round Key Exchange in the Standard Model
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Strongly Secure Certificateless Key Agreement
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Hi-index | 0.00 |
We show how to construct a certificateless key agreement protocol from the certificateless key encapsulation mechanism introduced by Lippold et al. (2009a) in ICISC 2009 using the Boyd et al. (2008) protocol from ACISP 2008. We introduce the Canetti-Krawczyk (CK) model for certificateless cryptography, give security notions for Type I and Type II adversaries in the CK model, and highlight the differences to the existing e2CK model discussed by Lippold et al. (2009b). The resulting CK model is more relaxed thus giving more power to the adversary than the original CK model.