Skip to main content

Advertisement

Springer Nature Link
Log in
Menu
Find a journal Publish with us Track your research
Search
Saved research
Cart
  1. Home
  2. Public Key Cryptography - PKC 2006
  3. Conference paper

Security-Mediated Certificateless Cryptography

  • Conference paper
  • pp 508–524
  • Cite this conference paper
Public Key Cryptography - PKC 2006 (PKC 2006)
Security-Mediated Certificateless Cryptography
  • Sherman S. M. Chow20,
  • Colin Boyd21 &
  • Juan Manuel González Nieto21 

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3958))

Included in the following conference series:

  • International Workshop on Public Key Cryptography
  • 2703 Accesses

  • 53 Citations

Abstract

We introduce the notion of security-mediated certificateless (SMC) cryptography. This allows more lightweight versions of mediated cryptography while maintaining the ability for instantaneous revocation of keys. Moreover, our solutions avoid key escrow, which has been used in all previous mediated cryptography algorithms. We provide a model of security against a fully-adaptive chosen ciphertext attacker, who may be a rogue key generation centre or any coalition of rogue users. We present a generic construction and also a concrete algorithm based on bilinear pairings. Our concrete scheme is more efficient than the identity-based mediated encryption scheme of Baek and Zheng in PKC 2004 which is provably secure in a comparable security model. In addition, our proposals can be easily extended to support distributed security mediators.

Download to read the full chapter text

Chapter PDF

Similar content being viewed by others

Security-Mediated Certificateless Undeniable Signature Scheme

Chapter © 2019

An Enhanced Certificateless Signcryption in the Standard Model

Article 26 October 2017

Certificateless Signcryption in the Standard Model

Article 04 August 2016

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Cryptology
  • DNA computing and cryptography
  • Principles and Models of Security
  • Quantum Communications and Cryptography
  • Security Services
  • Security Science and Technology
  • Attribute-Based Encryption in Cloud Computing Security

References

  1. Al-Riyami, S.S.: Cryptographic Schemes Based on Elliptic Curve Pairings. PhD thesis, Royal Holloway, University of London (2004)

    Google Scholar 

  2. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003), http://eprint.iacr.org/2003/126

    Chapter  Google Scholar 

  3. Al-Riyami, S.S., Paterson, K.G.: CBE from CL-PKE: A Generic Construction and Efficient Schemes. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 398–415. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  4. Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless Public Key Encryption Without Pairing. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 134–148. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Baek, J., Zheng, Y.: Identity-based Threshold Decryption. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 262–276. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient Algorithms for Pairing-based Cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354–368. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  7. Boneh, D., Ding, X., Tsudik, G.: Fine-grained control of security capabilities. ACM Transactions on Internet Technology 4(1), 60–82 (2004)

    Article  Google Scholar 

  8. Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. SIAM Journal on Computing 32(3), 586–615 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  9. Cheng, Z., Comley, R.: Efficient Certificateless Public Key Encryption. Cryptology ePrint Archive, Report 2005/012 (2005)

    Google Scholar 

  10. Ding, X., Tsudik, G.: Simple Identity-Based Cryptography with Mediated RSA. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 193–210. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Dodis, Y., Katz, J.: Chosen-Ciphertext Security of Multiple Encryption. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 188–209. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  12. Gentry, C.: Certificate-Based Encryption and the Certificate Revocation Problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272–293. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  13. Girault, M.: Self-certified Public Keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 490–497. Springer, Heidelberg (1991)

    Google Scholar 

  14. Huang, X., Susilo, W., Mu, Y., Zhang, F.: On the Security of Certificateless Signature Schemes from Asiacrypt 2003. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 13–25. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  15. Kang, B.G., Park, J.H.: Is it possible to have CBE from CL-PKE? Cryptology ePrint Archive, Report 2005/431 (2005)

    Google Scholar 

  16. Libert, B., Quisquater, J.-J.: Efficient Revocation and Threshold Pairing based Cryptosystems. In: PODC 2003 of the Twenty-Second ACM Symposium on Principles of Distributed Computing (PODC 2003), Boston, Massachusetts, USA, July 13-16, pp. 163–171. ACM Press, New York (2003)

    Google Scholar 

  17. Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  18. Shi, Y., Li, J.: Provable Efficient Certificateless Public Key Encryption. Cryptology ePrint Archive, Report 2005/287 (2005)

    Google Scholar 

  19. Shoup, V.: A Proposal for an ISO Standard for Public Key Encryption (Version 2.1). Cryptology ePrint Archive, Report 2001/112 (2001)

    Google Scholar 

  20. Vanrenen, G., Smith, S.: Distributing Security-Mediated PKI. In: Katsikas, S.K., Gritzalis, S., López, J. (eds.) EuroPKI 2004. LNCS, vol. 3093, pp. 218–231. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  21. Zhang, Z., Feng, D.: On the Security of a Certificateless Public-Key Encryption. Cryptology ePrint Archive, Report 2005/426 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Computer Science, Courant Institute of Mathematical Sciences, New York University, NY, 10012, USA

    Sherman S. M. Chow

  2. Information Security Institute, Queensland University of Technology, GPO Box 2434, Brisbane, QLD 4001, Australia

    Colin Boyd & Juan Manuel González Nieto

Authors
  1. Sherman S. M. Chow
    View author publications

    Search author on:PubMed Google Scholar

  2. Colin Boyd
    View author publications

    Search author on:PubMed Google Scholar

  3. Juan Manuel González Nieto
    View author publications

    Search author on:PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Computer Science Department, Google Inc. and Columbia University, 1214 Amsterdam Avenue, 10027, New York, NY, USA

    Moti Yung

  2. New York University, USA

    Yevgeniy Dodis

  3. Computer Science and Engineering, University of Connecticut, Storrs, CT, USA

    Aggelos Kiayias

  4. Dept. of Computer Science, Columbia University, USA

    Tal Malkin

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chow, S.S.M., Boyd, C., Nieto, J.M.G. (2006). Security-Mediated Certificateless Cryptography. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds) Public Key Cryptography - PKC 2006. PKC 2006. Lecture Notes in Computer Science, vol 3958. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11745853_33

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/11745853_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33851-2

  • Online ISBN: 978-3-540-33852-9

  • eBook Packages: Computer ScienceComputer Science (R0)Springer Nature Proceedings Computer Science

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • security-mediated cryptography
  • certificateless cryptography

Publish with us

Policies and ethics

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

162.0.217.198

Not affiliated

Springer Nature

© 2026 Springer Nature