Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model

dc.creatorHwang,Yong
dc.creatorLiu,Joseph
dc.creatorChow,Sherman
dc.date2008
dc.date.accessioned2024-02-06T12:56:15Z
dc.date.available2024-02-06T12:56:15Z
dc.descriptionRecently, Au et al. [Au et al. 2007] pointed out a seemingly neglected security concern for certificateless public key encryption (CL-PKE) scheme, where a malicious key generation center (KGC) can compromise the confidentiality of the messages by embedding extra trapdoors in the system parameter. Although some schemes are secure against such an attack, they require random oracles to prove the security. In this paper, we first show that two existing CL-PKE schemes without random oracles are not secure against malicious KGC, we then propose the first CL-PKE scheme secure against malicious KGC attack, with proof in the standard model.
dc.formattext/html
dc.identifierhttps://doi.org/10.3217/jucs-014-03-0463
dc.identifierhttps://lib.jucs.org/article/28959/
dc.identifier.urihttps://openrepository.mephi.ru/handle/123456789/9621
dc.languageen
dc.publisherJournal of Universal Computer Science
dc.relationinfo:eu-repo/semantics/altIdentifier/eissn/0948-6968
dc.relationinfo:eu-repo/semantics/altIdentifier/pissn/0948-695X
dc.rightsinfo:eu-repo/semantics/openAccess
dc.rightsJ.UCS License
dc.sourceJUCS - Journal of Universal Computer Science 14(3): 463-480
dc.subjectcertificateless encryption
dc.subjectmalicious KGC attack
dc.subjectstandard model
dc.titleCertificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
dc.typeResearch Article
Файлы