Enhanced Certificate-Based Encryption Scheme without Bilinear Pairings

Certificate-based cryptography is a useful public key cryptographic primitive that combines the merits of traditional public key cryptography and identity-based cryptography. It not only solves the key escrow problem inherent in identity-based cryptography, but also simplifies the cumbersome certifi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:KSII transactions on Internet and information systems 2016-02, Vol.10 (2), p.881-896
Hauptverfasser: Lu, Yang, Zhang, Quanling
Format: Artikel
Sprache:eng ; kor
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 896
container_issue 2
container_start_page 881
container_title KSII transactions on Internet and information systems
container_volume 10
creator Lu, Yang
Zhang, Quanling
description Certificate-based cryptography is a useful public key cryptographic primitive that combines the merits of traditional public key cryptography and identity-based cryptography. It not only solves the key escrow problem inherent in identity-based cryptography, but also simplifies the cumbersome certificate management problem in traditional public key cryptography. In this paper, by giving a concrete attack, we first show that the certificate-based encryption scheme without bilinear pairings proposed by Yao et al. does not achieve either the chosen-ciphertext security or the weaker chosen-plaintext security. To overcome the security weakness in Yao et al.`s scheme, we propose an enhanced certificate-based encryption scheme that does not use the bilinear pairings. In the random oracle model, we formally prove it to be chosen-ciphertext secure under the computational Diffie-Hellman assumption. The experimental results show that the proposed scheme enjoys obvious advantage in the computation efficiency compared with the previous certificate-based encryption schemes. Without costly pairing operations, it is suitable to be employed on the computation-limited or power-constrained devices.
doi_str_mv 10.3837/tils.2016.02.024
format Article
fullrecord <record><control><sourceid>gale_kisti</sourceid><recordid>TN_cdi_kisti_ndsl_JAKO201616534193612</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A449418528</galeid><kiss_id>3532094</kiss_id><sourcerecordid>A449418528</sourcerecordid><originalsourceid>FETCH-LOGICAL-g1172-ab29703fb8f0cf066d0f5a078e802d8b60dc283eb1b2ee9760db48f608f3bf423</originalsourceid><addsrcrecordid>eNptj99LwzAQx4MoOObeBV8K4mNrfjVJH7ex-WswQX0uaZpsh206mojsv7djIgpyB3d8-dx97xC6JDhjisnbCE3IKCYiw3RIfoJGpJAilVTK01_9OZqEABUmVFHBlRqh5cJvtTe2Tua2j-DA6GjTmQ6DsvCm3-8idD55MVvb2uQT4rb7iMkMGvBW98mzhh78JlygM6ebYCffdYzelovX-X26Wt89zKerdEOIpKmuaCExc5Vy2DgsRI1drrFUVmFaq0rg2lDFbEUqau1wNa4rrpzAyrHKccrG6Oa49x1ChNLXoSkfp0_rw-9E5IyTggly4K6P3EY3tgTvuthr00Iw5ZTzghOVDz5jlP1DDVHbFkznrYNB_zNw9WMfyl0Pre73JcsZxQVnX1FNckU</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Enhanced Certificate-Based Encryption Scheme without Bilinear Pairings</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Lu, Yang ; Zhang, Quanling</creator><creatorcontrib>Lu, Yang ; Zhang, Quanling</creatorcontrib><description>Certificate-based cryptography is a useful public key cryptographic primitive that combines the merits of traditional public key cryptography and identity-based cryptography. It not only solves the key escrow problem inherent in identity-based cryptography, but also simplifies the cumbersome certificate management problem in traditional public key cryptography. In this paper, by giving a concrete attack, we first show that the certificate-based encryption scheme without bilinear pairings proposed by Yao et al. does not achieve either the chosen-ciphertext security or the weaker chosen-plaintext security. To overcome the security weakness in Yao et al.`s scheme, we propose an enhanced certificate-based encryption scheme that does not use the bilinear pairings. In the random oracle model, we formally prove it to be chosen-ciphertext secure under the computational Diffie-Hellman assumption. The experimental results show that the proposed scheme enjoys obvious advantage in the computation efficiency compared with the previous certificate-based encryption schemes. Without costly pairing operations, it is suitable to be employed on the computation-limited or power-constrained devices.</description><identifier>ISSN: 1976-7277</identifier><identifier>EISSN: 1976-7277</identifier><identifier>DOI: 10.3837/tils.2016.02.024</identifier><language>eng ; kor</language><publisher>한국인터넷정보학회</publisher><subject>bilinear pairing ; Certificate-based cryptography ; chosen-ciphertext security ; Cryptography ; Data security ; encryption ; Methods ; random oracle model</subject><ispartof>KSII transactions on Internet and information systems, 2016-02, Vol.10 (2), p.881-896</ispartof><rights>COPYRIGHT 2016 KSII, the Korean Society for Internet Information</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,314,780,784,885,27924,27925</link.rule.ids></links><search><creatorcontrib>Lu, Yang</creatorcontrib><creatorcontrib>Zhang, Quanling</creatorcontrib><title>Enhanced Certificate-Based Encryption Scheme without Bilinear Pairings</title><title>KSII transactions on Internet and information systems</title><addtitle>KSII Transactions on Internet and Information Systems (TIIS)</addtitle><description>Certificate-based cryptography is a useful public key cryptographic primitive that combines the merits of traditional public key cryptography and identity-based cryptography. It not only solves the key escrow problem inherent in identity-based cryptography, but also simplifies the cumbersome certificate management problem in traditional public key cryptography. In this paper, by giving a concrete attack, we first show that the certificate-based encryption scheme without bilinear pairings proposed by Yao et al. does not achieve either the chosen-ciphertext security or the weaker chosen-plaintext security. To overcome the security weakness in Yao et al.`s scheme, we propose an enhanced certificate-based encryption scheme that does not use the bilinear pairings. In the random oracle model, we formally prove it to be chosen-ciphertext secure under the computational Diffie-Hellman assumption. The experimental results show that the proposed scheme enjoys obvious advantage in the computation efficiency compared with the previous certificate-based encryption schemes. Without costly pairing operations, it is suitable to be employed on the computation-limited or power-constrained devices.</description><subject>bilinear pairing</subject><subject>Certificate-based cryptography</subject><subject>chosen-ciphertext security</subject><subject>Cryptography</subject><subject>Data security</subject><subject>encryption</subject><subject>Methods</subject><subject>random oracle model</subject><issn>1976-7277</issn><issn>1976-7277</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>JDI</sourceid><recordid>eNptj99LwzAQx4MoOObeBV8K4mNrfjVJH7ex-WswQX0uaZpsh206mojsv7djIgpyB3d8-dx97xC6JDhjisnbCE3IKCYiw3RIfoJGpJAilVTK01_9OZqEABUmVFHBlRqh5cJvtTe2Tua2j-DA6GjTmQ6DsvCm3-8idD55MVvb2uQT4rb7iMkMGvBW98mzhh78JlygM6ebYCffdYzelovX-X26Wt89zKerdEOIpKmuaCExc5Vy2DgsRI1drrFUVmFaq0rg2lDFbEUqau1wNa4rrpzAyrHKccrG6Oa49x1ChNLXoSkfp0_rw-9E5IyTggly4K6P3EY3tgTvuthr00Iw5ZTzghOVDz5jlP1DDVHbFkznrYNB_zNw9WMfyl0Pre73JcsZxQVnX1FNckU</recordid><startdate>20160201</startdate><enddate>20160201</enddate><creator>Lu, Yang</creator><creator>Zhang, Quanling</creator><general>한국인터넷정보학회</general><general>KSII, the Korean Society for Internet Information</general><scope>HZB</scope><scope>Q5X</scope><scope>JDI</scope></search><sort><creationdate>20160201</creationdate><title>Enhanced Certificate-Based Encryption Scheme without Bilinear Pairings</title><author>Lu, Yang ; Zhang, Quanling</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-g1172-ab29703fb8f0cf066d0f5a078e802d8b60dc283eb1b2ee9760db48f608f3bf423</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng ; kor</language><creationdate>2016</creationdate><topic>bilinear pairing</topic><topic>Certificate-based cryptography</topic><topic>chosen-ciphertext security</topic><topic>Cryptography</topic><topic>Data security</topic><topic>encryption</topic><topic>Methods</topic><topic>random oracle model</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lu, Yang</creatorcontrib><creatorcontrib>Zhang, Quanling</creatorcontrib><collection>Korean Studies Information Service System (KISS)</collection><collection>Korean Studies Information Service System (KISS) B-Type</collection><collection>KoreaScience</collection><jtitle>KSII transactions on Internet and information systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lu, Yang</au><au>Zhang, Quanling</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Enhanced Certificate-Based Encryption Scheme without Bilinear Pairings</atitle><jtitle>KSII transactions on Internet and information systems</jtitle><addtitle>KSII Transactions on Internet and Information Systems (TIIS)</addtitle><date>2016-02-01</date><risdate>2016</risdate><volume>10</volume><issue>2</issue><spage>881</spage><epage>896</epage><pages>881-896</pages><issn>1976-7277</issn><eissn>1976-7277</eissn><abstract>Certificate-based cryptography is a useful public key cryptographic primitive that combines the merits of traditional public key cryptography and identity-based cryptography. It not only solves the key escrow problem inherent in identity-based cryptography, but also simplifies the cumbersome certificate management problem in traditional public key cryptography. In this paper, by giving a concrete attack, we first show that the certificate-based encryption scheme without bilinear pairings proposed by Yao et al. does not achieve either the chosen-ciphertext security or the weaker chosen-plaintext security. To overcome the security weakness in Yao et al.`s scheme, we propose an enhanced certificate-based encryption scheme that does not use the bilinear pairings. In the random oracle model, we formally prove it to be chosen-ciphertext secure under the computational Diffie-Hellman assumption. The experimental results show that the proposed scheme enjoys obvious advantage in the computation efficiency compared with the previous certificate-based encryption schemes. Without costly pairing operations, it is suitable to be employed on the computation-limited or power-constrained devices.</abstract><pub>한국인터넷정보학회</pub><doi>10.3837/tils.2016.02.024</doi><tpages>16</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1976-7277
ispartof KSII transactions on Internet and information systems, 2016-02, Vol.10 (2), p.881-896
issn 1976-7277
1976-7277
language eng ; kor
recordid cdi_kisti_ndsl_JAKO201616534193612
source EZB-FREE-00999 freely available EZB journals
subjects bilinear pairing
Certificate-based cryptography
chosen-ciphertext security
Cryptography
Data security
encryption
Methods
random oracle model
title Enhanced Certificate-Based Encryption Scheme without Bilinear Pairings
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T18%3A16%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_kisti&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Enhanced%20Certificate-Based%20Encryption%20Scheme%20without%20Bilinear%20Pairings&rft.jtitle=KSII%20transactions%20on%20Internet%20and%20information%20systems&rft.au=Lu,%20Yang&rft.date=2016-02-01&rft.volume=10&rft.issue=2&rft.spage=881&rft.epage=896&rft.pages=881-896&rft.issn=1976-7277&rft.eissn=1976-7277&rft_id=info:doi/10.3837/tils.2016.02.024&rft_dat=%3Cgale_kisti%3EA449418528%3C/gale_kisti%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_galeid=A449418528&rft_kiss_id=3532094&rfr_iscdi=true