File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1145/1229285.1266997
- Scopus: eid_2-s2.0-84876300178
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Malicious KGC attacks in certificateless cryptography
Title | Malicious KGC attacks in certificateless cryptography |
---|---|
Authors | |
Issue Date | 2007 |
Citation | eProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07, 2007, p. 302-311 How to Cite? |
Abstract | Identity-based cryptosystems have an inherent key escrow issue, that is, the Key Generation Center (KGC) always knows user secret key. If the KGC is malicious, it can always impersonate the user. Certificateless cryptography, introduced by Al-Riyami and Paterson in 2003, is intended to solve this problem. However, in all the previously proposed certificateless schemes, it is always assumed that the malicious KGC starts launching attacks (so-called Type II attacks) only after it has generated a master public/secret key pair honestly. In this paper, we propose new security models that remove this assumption for both certificateless signature and encryption schemes. Under the new models, we show that a class of certificateless encryption and signature schemes proposed previously are insecure. These schemes still suffer from the key escrow problem. On the other side, we also give new proofs to show that there are two generic constructions, one for certificateless signature and the other for certificateless encryption, proposed recently that are secure under our new models. Copyright 2007 ACM. |
Persistent Identifier | http://hdl.handle.net/10722/280740 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Chen, Jing | - |
dc.contributor.author | Liu, Joseph K. | - |
dc.contributor.author | Mu, Yi | - |
dc.contributor.author | Wong, Duncan S. | - |
dc.contributor.author | Yang, Guomin | - |
dc.date.accessioned | 2020-02-17T14:34:49Z | - |
dc.date.available | 2020-02-17T14:34:49Z | - |
dc.date.issued | 2007 | - |
dc.identifier.citation | eProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07, 2007, p. 302-311 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280740 | - |
dc.description.abstract | Identity-based cryptosystems have an inherent key escrow issue, that is, the Key Generation Center (KGC) always knows user secret key. If the KGC is malicious, it can always impersonate the user. Certificateless cryptography, introduced by Al-Riyami and Paterson in 2003, is intended to solve this problem. However, in all the previously proposed certificateless schemes, it is always assumed that the malicious KGC starts launching attacks (so-called Type II attacks) only after it has generated a master public/secret key pair honestly. In this paper, we propose new security models that remove this assumption for both certificateless signature and encryption schemes. Under the new models, we show that a class of certificateless encryption and signature schemes proposed previously are insecure. These schemes still suffer from the key escrow problem. On the other side, we also give new proofs to show that there are two generic constructions, one for certificateless signature and the other for certificateless encryption, proposed recently that are secure under our new models. Copyright 2007 ACM. | - |
dc.language | eng | - |
dc.relation.ispartof | eProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07 | - |
dc.title | Malicious KGC attacks in certificateless cryptography | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1145/1229285.1266997 | - |
dc.identifier.scopus | eid_2-s2.0-84876300178 | - |
dc.identifier.spage | 302 | - |
dc.identifier.epage | 311 | - |