Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Malicious KGC attacks in certificateless cryptography
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Generic Constructions of Identity-Based and Certificateless KEMs
Journal of Cryptology
Two-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Generic certificateless encryption in the standard model
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Certificateless encryption schemes strongly secure in the standard model
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Journal of Computer Science and Technology
On the security of certificateless signature schemes from asiacrypt 2003
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
CBE from CL-PKE: a generic construction and efficient schemes
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Efficient identity-based encryption without random oracles
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Certificateless public key encryption without pairing
ISC'05 Proceedings of the 8th international conference on Information Security
On constructing certificateless cryptosystems from identity based encryption
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Practical identity-based encryption without random oracles
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Cryptanalysis of a Certificateless Encryption Scheme in the Standard Model
INCOS '12 Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems
Hi-index | 0.00 |
Certificateless public key cryptography was introduced to solve the key escrow problem in identity based cryptography without using public key certificates. In this paper, we investigate certificateless encryption (CLE) scheme whose security does not rely on random oracles. We present a practical CLE scheme which is proved CCA2 secure in the standard model. Our scheme can be regarded as a modification to Zhang et al.'s scheme [5] which has been confirmed insecure against type II adversaries. The newly proposed CLE scheme not only overcomes the security drawbacks of Zhang et al.'s scheme, but also preserves its most distinctive feature of a short public key length. The formal security proof shows that the new scheme is IND-CCA2 secure against Type I and Type II attackers without random oracle under the decisional truncated q-ABDHE assumption and the DBDH assumption, respectively.