The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes

Antigoni Polychroniadou, Konstantinos Chalkias, George Stephanides

2012

Abstract

This paper introduces the concept of compatibility and presents an extended classification of two IBE-related schemes, the Identity-Based Encryption (IBE) and the Certificate-Less Encryption (CLE) in order to implement compatible systems. It cannot be denied that IBE, which can be extended to support a plethora of encryption models, gains widespread adoption day by day as it solves problems within conventional public key schemes and it results in a simplified key management, making it much more lightweight to deploy. Based on the fact that a number of different encryption schemes stemmed from IBE, an implementation of an IBE-related compatible system enables a number of different encryptions on-the-fly based on the user’s needs at a specific moment. Our approach categorizes known concrete constructions from two IBE-related types into classes and analyzes similarities concerning public settings, used keys, protocol structures and provided model of provable security. Therefore, we consider compatibility issues between CLE and IBE and we conclude that a significant number of them are closely related. Therefore, the concept of compatibility can be put into practice.

References

  1. Al-riyami, S. S. and Paterson, K. G. (2003). Certificateless public key cryptography. In Asiacrypt2003, pages 452-473. Springer-Verlag.
  2. Al-riyami, S. S. and Paterson, K. G. (2005). CBE from CLPKE: A generic construction and efficient schemes. In Public Key Cryptography - PKC 2005, Lecture Notes in Comput. Sci, pages 398-415. Springer.
  3. Baek, J., Safavi-Naini, R., and Susilo, W. (2005). Certificateless public key encryption without pairing. In ISC, pages 134-148.
  4. Boneh, D. and Boyen, X. (2004). Efficient selective-id secure identity based encryption without random oracles. In Proceedings of Eurocrypt 2004, volume 3027 of LNCS, pages 223-238. Springer-Verlag.
  5. Boneh, D. and Franklin, M. (2003). Identity-based encryption from the weil pairing. SIAM J. of Computing, 32:586-615.
  6. Cheng, Z., Chen, L., Ling, L., and Comley, R. (2007). General and efficient certificateless public key encryption constructions. In Pairing, pages 83-107.
  7. Cocks, C. (2001). An identity based encryption scheme based on quadratic residues. In Proceedings of the 8th IMA Int. Conf., pages 360-363. Springer-Verlag.
  8. Dent, A. W., Libert, B., and Paterson, K. G. (2008). Certificateless encryption schemes strongly secure in the standard model. In 11th international conference on Public key cryptography, PKC'08, pages 344-359. Springer-Verlag.
  9. Gentry, C. (2006). Practical identity-based encryption without random oracles. In EUROCRYPT, pages 445-464.
  10. Kasahara, R. S. M. (2003). ID based cryptosystems with pairing on elliptic curve. Cryptology ePrint Archive.
  11. Katz, J. and Wang, N. (2003). Efficiency improvements for signature schemes with tight security reductions. In Proceedings of the 10th ACM conference on Computer and communications security, CCS 7803, pages 155-164.
  12. Lai, J., Deng, R. H., Liu, S., and Kou, W. (2009). RSABased certificateless public key encryption. In Proceedings of the 5th International Conference on Information Security Practice and Experience, ISPEC 7809, pages 24-34. Springer-Verlag.
  13. Libert, B. and jacques Quisquater, J. (2006). On constructing certificateless cryptosystems from identity based encryption. In In PKC 2006, pages 474-490. Springer-Verlag.
  14. Park, J. H., Choi, K. Y., Hwang, J. Y., and Lee, D. H. (2007). Certificateless public key encryption in the selectiveID security model (without random oracles). In Pairing, pages 60-82.
  15. Shamir, A. (1985). Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO 84 on Advances in cryptology, pages 47-53. Springer-Verlag New York, Inc.
  16. Sun, Y., Zhang, F., and Baek, J. (2007). Strongly secure certificateless public key encryption without pairing. In CANS, pages 194-208.
  17. Waters, B. (2005). Efficient identity-based encryption without random oracles. In EUROCRYPT 2005, pages 114-127. Springer-Verlag.
Download


Paper Citation


in Harvard Style

Polychroniadou A., Chalkias K. and Stephanides G. (2012). The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 403-407. DOI: 10.5220/0004076704030407


in Bibtex Style

@conference{secrypt12,
author={Antigoni Polychroniadou and Konstantinos Chalkias and George Stephanides},
title={The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={403-407},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004076704030407},
isbn={978-989-8565-24-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes
SN - 978-989-8565-24-2
AU - Polychroniadou A.
AU - Chalkias K.
AU - Stephanides G.
PY - 2012
SP - 403
EP - 407
DO - 10.5220/0004076704030407