scispace - formally typeset
Open AccessProceedings ArticleDOI

Malicious KGC attacks in certificateless cryptography

TLDR
Wang et al. as discussed by the authors proposed new security models that remove this assumption for both certificateless signature and encryption schemes and showed that a class of certificateless encryption and signature schemes proposed previously are insecure.
Abstract
Identity-based cryptosystems have an inherent key escrow issue, that is, the Key Generation Center (KGC) always knows user secret key. If the KGC is malicious, it can always impersonate the user. Certificateless cryptography, introduced by Al-Riyami and Paterson in 2003, is intended to solve this problem. However, in all the previously proposed certificateless schemes, it is always assumed that the malicious KGC starts launching attacks (so-called Type II attacks) only after it has generated a master public/secret key pair honestly. In this paper, we propose new security models that remove this assumption for both certificateless signature and encryption schemes. Under the new models, we show that a class of certificateless encryption and signature schemes proposed previously are insecure. These schemes still suffer from the key escrow problem. On the other side, we also give new proofs to show that there are two generic constructions, one for certificateless signature and the other for certificateless encryption, proposed recently that are secure under our new models.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

Certificateless signature revisited

TL;DR: This paper revisits the security models of certificateless signatures and proposes two new constructions which are provably secure in the random oracle model and proves secure against Normal Type I and Super Type II Adversary.
Proceedings ArticleDOI

Certificateless signcryption

TL;DR: This paper introduces the notion of certificateless signcryption and presents an efficient construction which guarantees security under insider attacks, and therefore provides forward secrecy and non-repudiation.
Journal ArticleDOI

Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks

TL;DR: A remote authentication protocol featured with nonrepudiation, client anonymity, key escrow resistance, and revocability for extra-body communication in the WBANs, and a certificateless anonymous remote authentication with revocation is constructed by incorporating the proposed encryption scheme and signature scheme.
Posted Content

A Survey of Certificateless Encryption Schemes and Security Models.

TL;DR: A survey of the literature on certificateless encryption can be found in this paper, where the authors examine the security models that have been proposed to prove the security of CCE schemes and propose a new nomenclature for these models.
Journal ArticleDOI

Certificateless signcryption scheme in the standard model

TL;DR: The proposed certificateless signcryption scheme is proven to be IND-CCA2 secure under the decisional Bilinear Diffie-Hellman intractability assumption without using the random oracles and to be existentially unforgeable under the computational Diffie -Hellmanintractability assumptions.
References
More filters
Book ChapterDOI

Identity-based cryptosystems and signature schemes

TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Proceedings ArticleDOI

Random oracles are practical: a paradigm for designing efficient protocols

TL;DR: It is argued that the random oracles model—where all parties have access to a public random oracle—provides a bridge between cryptographic theory and cryptographic practice, and yields protocols much more efficient than standard ones while retaining many of the advantages of provable security.
Journal ArticleDOI

Identity-Based Encryption from the Weil Pairing

TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.
Journal ArticleDOI

A digital signature scheme secure against adaptive chosen-message attacks

TL;DR: A digital signature scheme based on the computational difficulty of integer factorization possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice cannot later forge the signature of even a single additional message.
Book ChapterDOI

Certificateless Public Key Cryptography

TL;DR: In this article, the concept of certificateless public key cryptography (CL-PKC) was introduced and made concrete, which does not require certificates to guarantee the authenticity of public keys.