Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Malicious KGC attacks in certificateless cryptography
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
A survey of certificateless encryption schemes and security models
International Journal of Information Security
An Efficient Certificateless Encryption Scheme in the Standard Model
NSS '09 Proceedings of the 2009 Third International Conference on Network and System Security
Generic certificateless key encapsulation mechanism
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Generic certificateless encryption in the standard model
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Certificateless encryption schemes strongly secure in the standard model
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Journal of Computer Science and Technology
Certificateless public key encryption without pairing
ISC'05 Proceedings of the 8th international conference on Information Security
On constructing certificateless cryptosystems from identity based encryption
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Key replacement attack against a generic construction of certificateless signature
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Cryptanalysis of a Certificateless Encryption Scheme in the Standard Model
INCOS '12 Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems
Hi-index | 0.00 |
Certificateless public key cryptography eliminates inherent key escrow problem in identity-based cryptography, and does not yet requires certificates as in the traditional public key infrastructure. In this paper, we give crypt-analysis to Hwang et al.'s certificateless encryption scheme which is the first concrete certificateless encryption scheme that can be proved to be secure against "malicious-but-passive" key generation center (KGC) attack in the standard model. Their scheme is proved to be insecure even in a weaker security model called "honest-but-curious" KGC attack model. We then propose an improved scheme which is really secure against "malicious-but-passive" KGC attack in the standard model.