Abstract
Certificateless public key cryptography eliminates inherent key escrow problem in identity-based cryptography, and does not yet requires certificates as in the traditional public key infrastructure. In this paper, we give crypt-analysis to Hwang et al.’s certificateless encryption scheme which is the first concrete certificateless encryption scheme that can be proved to be secure against “malicious-but-passive” key generation center (KGC) attack in the standard model. Their scheme is proved to be insecure even in a weaker security model called “honest-but-curious” KGC attack model. We then propose an improved scheme which is really secure against “malicious-but-passive” KGC attack in the standard model.
Similar content being viewed by others
References
Al-riyami S S, Paterson K G. Certificateless public key cryptography. Lecture Notes in Computer Science, 2003, 2894: 452–473
Shamir A. Identity-based cryptosystems and signature schemes. Lecture Notes in Computer Science, 1985, 196: 47–53
Au M H, Mu Y, Chen J, Wong D S, Liu J K, Yang G. Malicious kgc attacks in certificateless cryptography. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. 2007, 302–311
Baek J, Safavi-Naini R, Susilo W. Certificateless public key encryption without pairing. In: Proceedings of the 8th International Conference on Information Security. 2005, 134–148
Libert B, Quisouater J J. On constructing certificateless cryptosystems from identity based encryption. Lecture Notes in Computer Science, 2006, 3958: 474–490
Sun Y, Li H. Short-ciphertext and BDH-based CCA2 secure certificateless encryption. Science China Information Sciences, 2010, 53(10): 2005–2015
Bellare M, Rogaway P. Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security. 1993, 62–73
Yum D H, Lee P J. Generic construction of certificateless encryption. Lecture Notes in Computer Science, 2004, 3043: 802–811
Huang Q, Wong D S. Generic certificateless encryption secure against malicious-but-passive kgc attacks in the standard model. Journal of Computer Science and Technology, 2010, 25(4): 807–826
Hu B C, Wong D S, Zhang Z, Deng X. Key replacement attack against a generic construction of certificateless signature. Lecture Notes in Computer Science, 2006, 4058: 235–246
Liu J K, Au M H, Susilo W. Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. 2007, 273–283
Dent A W, Libert B, Paterson K G. Certificateless encryption schemes strongly secure in the standard model. Lecture Notes in Computer Science, 2008, 4939: 344–359
Guo H, Zhang X, Mu Y, Li Z. An efficient certificateless encryption scheme in the standard model. In: Proceedings of the 3rd International Conference on Network and System Security. 2009, 302-309
Hwang Y H, Liu J K, Chow S S. Certificateless public key encryption secure against malicious KGC attacks in the standard model. Journal of Universal Computer Science, 2008, 14(3): 463–480
Zhang G, Wang X. Certificateless encryption scheme secure in standard model. Tsinghua Science & Technology, 2009, 14(4): 452–459
Shen L, Zhang F, Sun Y, Li S. Cryptanalysis of a certificateless encryption scheme in the standard model. In: Proceedings of the 4th International Conference on Intelligent Networking and Collaborative Systems. 2012, 329–333
Dent A W. A survey of certificateless encryption schemes and security models. International Journal of Information Security, 2008, 7(5): 349–377
Cheng Z, Comley R. Efficient certificateless public key encryption. IACR Cryptology Eprint Archive: Report 2005/249, 2005
Huang Q, Wong D S. Generic certificateless encryption in the standard model. In: Proceedings of the 2nd International Conference on Advances in Information and Computer Security. 2007, 278–291
Huang Q, Wong D S. Generic certificateless key encapsulation mechanism. In: Proceedings of the 12th Australasian Conference on Information Security and Privacy. 2007, 215–229
Author information
Authors and Affiliations
Corresponding author
Additional information
Lin Cheng is currently a PhD candidate in State Key Laboratory of Networking and Switch Technology, Beijing University of Posts and Telecommunications. His present research interests include cryptography, information security and cloud computing.
Qiaoyan Wen received her BS and MS from Shaanxi normal University in 1981 and 1984, respectively, and her PhD from Xidian University in 1997. Now, she is a professor of Beijing University of Posts and Telecommunications. Her present research interests include cryptography, information security, and cloud computing.
Zhengping Jin received his BS and MS from Anhui Normal University in 2004 and 2007, respectively, and his PhD from Beijing University of Posts and Telecommunications in 2010. Now he is a lecturer of Beijing University of Posts and Telecommunications. His research interests include design and analysis of cryptographic protocols, and security in Internet of Things.
Hua Zhang received her BS and MS from Xidian University in 2002 and 2005, respectively, and her PhD degree from Beijing University of Posts and Telecommunications in 2008. Now she is an associate professor of Beijing University of Posts and Telecommunications. Her research interests include cryptographic protocols, security in Internet of Things, cloud computing, industrial control systems, and mobile Internet.
Rights and permissions
About this article
Cite this article
Cheng, L., Wen, Q., Jin, Z. et al. Cryptanalysis and improvement of a certificateless encryption scheme in the standard model. Front. Comput. Sci. 8, 163–173 (2014). https://doi.org/10.1007/s11704-013-3090-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11704-013-3090-6