Strongly secure certificateless key exchange without pairing

G Yang, CH Tan - Proceedings of the 6th ACM Symposium on …, 2011 - dl.acm.org
G Yang, CH Tan
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011dl.acm.org
In certificateless cryptography, a user secret key is derived from two partial secrets: one is
the identity-based secret key (corresponding to the user identity) generated by a Key
Generation Center (KGC), and the other is the user self-generated secret key
(corresponding to a user self-generated and uncertified public key). Two types of
adversaries are considered for certificateless cryptography: a Type-I adversary who can
replace the user self-generated public key (in transmission or in a public directory), and a …
In certificateless cryptography, a user secret key is derived from two partial secrets: one is the identity-based secret key (corresponding to the user identity) generated by a Key Generation Center (KGC), and the other is the user self-generated secret key (corresponding to a user self-generated and uncertified public key). Two types of adversaries are considered for certificateless cryptography: a Type-I adversary who can replace the user self-generated public key (in transmission or in a public directory), and a Type-II adversary who is an honest-but-curious KGC. In this paper, we present a formal study on certificateless key exchange (CLKE). We show that the conventional definition of Type-I and Type-II security may not be suitable for certificateless key exchange when considering the notion of forward secrecy which is important for key exchange protocols. We then present a new security model in which a single adversary (instead of Type-I and Type-II adversaries) is considered. We also construct a strongly secure certificateless key exchange protocol without expensive pairing operations. As far as we know, our proposed protocol is the first proven secure CLKE protocol without pairing.
ACM Digital Library
以上显示的是最相近的搜索结果。 查看全部搜索结果