CCA SECURE CERTIFICATELESS ENCRYPTION SCHEMES BASED ON RSA

S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan

2011

Abstract

Certificateless cryptography, introduced by Al-Riyami and Paterson eliminates the key escrow problem inherent in identity based cryptosystem. In this paper, we present two novel and completely different RSA based adaptive chosen ciphertext secure (CCA2) certificateless encryption schemes. For the first scheme, the security against Type-I adversary is reduced to RSA problem, while the security against Type-II adversary is reduced to the CCDH problem. For teh second scheme both Type-I and Type-II security is related to the RSA problem. The new schemes are efficient when compared to other existing certificatless encryption schemes that are based on the costly bilinear pairing operation and are quite comparable with the certificateless encryption scheme based on multiplicative groups (without bilinear pairing) by Sun et al. (Sun et al., 2007) and the RSA based CPA secure certificateless encryption scheme by Lai et al. (Lai et al., 2009). We consider a slightly stronger security model than the ones considered in (Lai et al., 2009) and (Sun et al., 2007) to prove the security of our schemes.

References

  1. Al-Riyami, S. S. and Paterson, K. G. (2003). Certificateless public key cryptography. In Advances in Cryptology - ASIACRYPT 2003, volume 2894 of Lecture Notes in Computer Science, pages 452-473. Springer.
  2. Al-Riyami, S. S. and Paterson, K. G. (2003). Certificateless public key cryptography. In Advances in Cryptology - ASIACRYPT 2003, volume 2894 of Lecture Notes in Computer Science, pages 452-473. Springer.
  3. Baek, J., Safavi-Naini, R., and Susilo, W. (2005). Certificateless public key encryption without pairing. In Information Security - ISC 2005, volume 3650 of Lecture Notes in Computer Science, pages 134-148. Springer.
  4. Baek, J., Safavi-Naini, R., and Susilo, W. (2005). Certificateless public key encryption without pairing. In Information Security - ISC 2005, volume 3650 of Lecture Notes in Computer Science, pages 134-148. Springer.
  5. Boyen, X. (2003). Multipurpose identity-based signcryption (a swiss army knife for identity-based cryptography). In Advances in Cryptology - CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 383-399. Springer.
  6. Boyen, X. (2003). Multipurpose identity-based signcryption (a swiss army knife for identity-based cryptography). In Advances in Cryptology - CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 383-399. Springer.
  7. Castro, R. and Dahab, R. (2007). Two notes on the security of certificateless signatures. In Provable Security - ProvSec 2007, volume 4784 of Lecture Notes in Computer Science, pages 85-102. Springer.
  8. Castro, R. and Dahab, R. (2007). Two notes on the security of certificateless signatures. In Provable Security - ProvSec 2007, volume 4784 of Lecture Notes in Computer Science, pages 85-102. Springer.
  9. Cheng, Z. and Comley, R. (2005). Efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/012. http://eprint.iacr.org/.
  10. Cheng, Z. and Comley, R. (2005). Efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/012. http://eprint.iacr.org/.
  11. Dent, A. W. (2008). A survey of certificateless encryption schemes and security models. International Journal of Information Security, Vol-7(No-5):349-377.
  12. Dent, A. W. (2008). A survey of certificateless encryption schemes and security models. International Journal of Information Security, Vol-7(No-5):349-377.
  13. Freeman, D., Scott, M., and Teske, E. (2010). A taxonomy of pairing-friendly elliptic curves. Journal of Cryptology, Vol-23(No-2):224-280.
  14. Freeman, D., Scott, M., and Teske, E. (2010). A taxonomy of pairing-friendly elliptic curves. Journal of Cryptology, Vol-23(No-2):224-280.
  15. Fujisaki, E. and Okamoto, T. (1999a). How to enhance the security of public-key encryption at minimum cost. In Public Key Cryptography, PKC 7899, volume 1560 of Lecture Notes in Computer Science, pages 53-68. Springer.
  16. Fujisaki, E. and Okamoto, T. (1999a). How to enhance the security of public-key encryption at minimum cost. In Public Key Cryptography, PKC 7899, volume 1560 of Lecture Notes in Computer Science, pages 53-68. Springer.
  17. Fujisaki, E. and Okamoto, T. (1999b). Secure integration of asymmetric and symmetric encryption schemes. In Advances in Cryptology - CRYPTO 7899, volume 1666 of Lecture Notes in Computer Science, pages 537- 554. Springer.
  18. Fujisaki, E. and Okamoto, T. (1999b). Secure integration of asymmetric and symmetric encryption schemes. In Advances in Cryptology - CRYPTO 7899, volume 1666 of Lecture Notes in Computer Science, pages 537- 554. Springer.
  19. Huang, X., Susilo, W., Mu, Y., and Zhang, F. (2005). On the security of certificateless signature schemes from asiacrypt 2003. In Cryptology and Network Security - CANS 2005, volume 3810 of Lecture Notes in Computer Science, pages 13-25. Springer.
  20. Huang, X., Susilo, W., Mu, Y., and Zhang, F. (2005). On the security of certificateless signature schemes from asiacrypt 2003. In Cryptology and Network Security - CANS 2005, volume 3810 of Lecture Notes in Computer Science, pages 13-25. Springer.
  21. Lai, J., Deng, R. H., Liu, S., and Kou, W. (2009). Rsabased certificateless public key encryption. In Information Security Practice and Experience - ISPEC 2009, volume 5451 of Lecture Notes in Computer Science, pages 24-34. Springer.
  22. Lai, J., Deng, R. H., Liu, S., and Kou, W. (2009). Rsabased certificateless public key encryption. In Information Security Practice and Experience - ISPEC 2009, volume 5451 of Lecture Notes in Computer Science, pages 24-34. Springer.
  23. Liu, J. K., Au, M. H., and Susilo, W. (2007). Self-generatedcertificate public key cryptography and certificateless signature/encryption scheme in the standard model: extended abstract. In ASIACCS 2007, Proceedings of the 2nd ACM symposium on Information, Computer and Communications Security, pages 273-283. ACM.
  24. Liu, J. K., Au, M. H., and Susilo, W. (2007). Self-generatedcertificate public key cryptography and certificateless signature/encryption scheme in the standard model: extended abstract. In ASIACCS 2007, Proceedings of the 2nd ACM symposium on Information, Computer and Communications Security, pages 273-283. ACM.
  25. McCurley, K. S. (1988). A key distribution system equivalent to factoring. Journal of Cryptology, Volume 1(Number 2):95-105.
  26. McCurley, K. S. (1988). A key distribution system equivalent to factoring. Journal of Cryptology, Volume 1(Number 2):95-105.
  27. Park, J. H., Choi, K. Y., Hwang, J. Y., and Lee, D. H. (2007). Certificateless public key encryption in the selective-id security model (without random oracles). In Pairing-Based Cryptography - Pairing 2007, volume 4575 of Lecture Notes in Computer Science, pages 60-82. Springer.
  28. Park, J. H., Choi, K. Y., Hwang, J. Y., and Lee, D. H. (2007). Certificateless public key encryption in the selective-id security model (without random oracles). In Pairing-Based Cryptography - Pairing 2007, volume 4575 of Lecture Notes in Computer Science, pages 60-82. Springer.
  29. Selvi, S. D., Vivek, S., and Rangan, C. (2010). Cca2 secure certificateless encryption schemes based on rsa. Cryptology ePrint Archive, Report 2010/459. http://eprint.iacr.org/.
  30. Selvi, S. D., Vivek, S., and Rangan, C. (2010). Cca2 secure certificateless encryption schemes based on rsa. Cryptology ePrint Archive, Report 2010/459. http://eprint.iacr.org/.
  31. Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Advances in Cryptology, CRYPTO - 1984, volume 196 of Lecture Notes in Computer Science, pages 47-53. Springer.
  32. Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Advances in Cryptology, CRYPTO - 1984, volume 196 of Lecture Notes in Computer Science, pages 47-53. Springer.
  33. Shi, Y. and Li, J. (2005). Provable efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/287. http://eprint.iacr.org.
  34. Shi, Y. and Li, J. (2005). Provable efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/287. http://eprint.iacr.org.
  35. Shmuely, Z. (February, 1985.). Composite diffie-hellman public-key generating systems are hard to break. Technical Report No. 356, Computer Science Department, Technion-Israel Institute of Technology.
  36. Shmuely, Z. (February, 1985.). Composite diffie-hellman public-key generating systems are hard to break. Technical Report No. 356, Computer Science Department, Technion-Israel Institute of Technology.
  37. Sun, Y., Zhang, F., and Baek, J. (2007). Strongly secure certificateless public key encryption without pairing. In Cryptology and Network Security - CANS 2007, volume 4856 of Lecture Notes in Computer Science, pages 194-208. Springer.
  38. Sun, Y., Zhang, F., and Baek, J. (2007). Strongly secure certificateless public key encryption without pairing. In Cryptology and Network Security - CANS 2007, volume 4856 of Lecture Notes in Computer Science, pages 194-208. Springer.
Download


Paper Citation


in Harvard Style

Sree Vivek S., Sharmila Deva Selvi S. and Pandu Rangan C. (2011). CCA SECURE CERTIFICATELESS ENCRYPTION SCHEMES BASED ON RSA . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 208-217. DOI: 10.5220/0003529502080217


in Harvard Style

Sree Vivek S., Sharmila Deva Selvi S. and Pandu Rangan C. (2011). CCA SECURE CERTIFICATELESS ENCRYPTION SCHEMES BASED ON RSA . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 208-217. DOI: 10.5220/0003529502080217


in Bibtex Style

@conference{secrypt11,
author={S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan},
title={CCA SECURE CERTIFICATELESS ENCRYPTION SCHEMES BASED ON RSA},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={208-217},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003529502080217},
isbn={978-989-8425-71-3},
}


in Bibtex Style

@conference{secrypt11,
author={S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan},
title={CCA SECURE CERTIFICATELESS ENCRYPTION SCHEMES BASED ON RSA},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={208-217},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003529502080217},
isbn={978-989-8425-71-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - CCA SECURE CERTIFICATELESS ENCRYPTION SCHEMES BASED ON RSA
SN - 978-989-8425-71-3
AU - Sree Vivek S.
AU - Sharmila Deva Selvi S.
AU - Pandu Rangan C.
PY - 2011
SP - 208
EP - 217
DO - 10.5220/0003529502080217


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - CCA SECURE CERTIFICATELESS ENCRYPTION SCHEMES BASED ON RSA
SN - 978-989-8425-71-3
AU - Sree Vivek S.
AU - Sharmila Deva Selvi S.
AU - Pandu Rangan C.
PY - 2011
SP - 208
EP - 217
DO - 10.5220/0003529502080217