A COMPATIBLE IMPLEMENTATION BETWEEN IDENTITY-BASED AND CERTIFICATELESS ENCRYPTION SCHEMES

Antigoni Polychroniadou, Kostantinos Chalkias, George Stephanides

2012

Abstract

In this paper we put into practice the concept of compatibility and we present a classification of two IBE-related schemes, the Identity-Based Encryption (IBE) and the Certificate-Less Encryption (CLE). An innovative implementation of a compatible IBE and CLE system was developed in order to support different encryptions on-the-fly based on the user’s needs at a specific moment. Motivated from the fact that there are numerous theoretically efficient IBE-related schemes in the literature overshadowing the benefits of traditional public key encryption (PKI) schemes, they did not, in any important way implemented into practice, as the widely-used PKI. The question is why this is the case since IBE solves a number of problems associated with PKI. Therefore, the controversial issue concerning the widespread use of IBE schemes into practice and the issue of compatibility between IBE and CLE are discussed in this paper. These real problems hinder the wide use of IBE. However, it cannot be denied that IBE, which can be extended to support a plethora of encryption models, gains widespread adoption day by day as it solves problems within conventional public key schemes and it results in a simplified key management, making it much more lightweight to deploy. Based on the fact that a number of different encryption schemes stemmed from IBE, an implementation of an IBE-related compatible system is important. Our approach categorizes known concrete constructions from two IBE-related types into classes and analyzes similarities concerning public settings, used keys, protocol structures and provided model of provable security.

References

  1. Al-riyami, S. S. and Paterson, K. G. (2003). Certificateless public key cryptography. In Asiacrypt2003, pages 452-473. Springer-Verlag.
  2. Al-riyami, S. S. and Paterson, K. G. (2005). CBE from CLPKE: A generic construction and efficient schemes. In Public Key Cryptography - PKC 2005, Lecture Notes in Comput. Sci, pages 398-415. Springer.
  3. Anastasios Kihidis, Chalkias Konstantinos, S. G. (2010). Practical implementation of identity based encryption for secure e-mail communication. In In 14th Panhellenic Conferenceon Informatics, PCI 2010. IEEE CS.
  4. Baek, J., Safavi-Naini, R., and Susilo, W. (2005). Certificateless public key encryption without pairing. In ISC, pages 134-148.
  5. Boneh, D. and Boyen, X. (2004). Efficient selective-id secure identity based encryption without random oracles. In Proceedings of Eurocrypt 2004, volume 3027 of LNCS, pages 223-238. Springer-Verlag.
  6. Boneh, D. and Franklin, M. (2003). Identity-based encryption from the weil pairing. SIAM J. of Computing, 32:586-615.
  7. Cheng, Z., Chen, L., Ling, L., and Comley, R. (2007). General and efficient certificateless public key encryption constructions. In Pairing, pages 83-107.
  8. Cocks, C. (2001). An identity based encryption scheme based on quadratic residues. In Proceedings of the 8th IMA Int. Conf., pages 360-363. Springer-Verlag.
  9. Dent, A. W., Libert, B., and Paterson, K. G. (2008). Certificateless encryption schemes strongly secure in the standard model. In 11th international conference on Public key cryptography, PKC'08, pages 344-359. Springer-Verlag.
  10. Gentry, C. (2006). Practical identity-based encryption without random oracles. In EUROCRYPT, pages 445-464.
  11. Kasahara, R. S. M. (2003). ID based cryptosystems with pairing on elliptic curve. Cryptology ePrint Archive.
  12. Katz, J. and Wang, N. (2003). Efficiency improvements for signature schemes with tight security reductions. In Proceedings of the 10th ACM conference on Computer and communications security, CCS 7803, pages 155-164.
  13. Lai, J., Deng, R. H., Liu, S., and Kou, W. (2009). RSABased certificateless public key encryption. In Proceedings of the 5th International Conference on Information Security Practice and Experience, ISPEC 7809, pages 24-34. Springer-Verlag.
  14. Lai, J. and Kou, W. (2007). Self-generated-certificate public key encryption without pairing. In 10th international conference on Practice and theory in public-key cryptography, PKC'07, pages 476-489. Springer-Verlag.
  15. Libert, B. and jacques Quisquater, J. (2006). On constructing certificateless cryptosystems from identity based encryption. In In PKC 2006, pages 474-490. Springer-Verlag.
  16. Park, J. H., Choi, K. Y., Hwang, J. Y., and Lee, D. H. (2007). Certificateless public key encryption in the selectiveID security model (without random oracles). In Pairing, pages 60-82.
  17. Shamir, A. (1985). Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO 84 on Advances in cryptology, pages 47-53. Springer-Verlag New York, Inc.
  18. Sun, Y., Zhang, F., and Baek, J. (2007). Strongly secure certificateless public key encryption without pairing. In CANS, pages 194-208.
  19. Waters, B. (2005). Efficient identity-based encryption without random oracles. In EUROCRYPT 2005, pages 114-127. Springer-Verlag.
Download


Paper Citation


in Harvard Style

Polychroniadou A., Chalkias K. and Stephanides G. (2012). A COMPATIBLE IMPLEMENTATION BETWEEN IDENTITY-BASED AND CERTIFICATELESS ENCRYPTION SCHEMES . In Proceedings of the 8th International Conference on Web Information Systems and Technologies - Volume 1: WEBIST, ISBN 978-989-8565-08-2, pages 225-230. DOI: 10.5220/0003975302250230


in Bibtex Style

@conference{webist12,
author={Antigoni Polychroniadou and Kostantinos Chalkias and George Stephanides},
title={A COMPATIBLE IMPLEMENTATION BETWEEN IDENTITY-BASED AND CERTIFICATELESS ENCRYPTION SCHEMES},
booktitle={Proceedings of the 8th International Conference on Web Information Systems and Technologies - Volume 1: WEBIST,},
year={2012},
pages={225-230},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003975302250230},
isbn={978-989-8565-08-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 8th International Conference on Web Information Systems and Technologies - Volume 1: WEBIST,
TI - A COMPATIBLE IMPLEMENTATION BETWEEN IDENTITY-BASED AND CERTIFICATELESS ENCRYPTION SCHEMES
SN - 978-989-8565-08-2
AU - Polychroniadou A.
AU - Chalkias K.
AU - Stephanides G.
PY - 2012
SP - 225
EP - 230
DO - 10.5220/0003975302250230