Cryptanalysis of a certificateless encryption scheme

  • Lianjun Chen*
  • , Lei Zhang
  • , Bo Qin
  • , Qianhong Wu
  • , Huanguo Zhang
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Certificateless public key cryptography was introduced to address the heavy certificate management in traditional public key cryptography and the key escrow problem in identity-based public key cryptography. Two types of adversaries are considered in certificateless public key cryptography: Type I adversary (outsider) and Type II Adversary (honest-but-curious and/or malicious-but-passive key generation center). A secure certificateless encryption (CLE) scheme must be secure against both types of adversaries. In this paper, we illustrate a recently proposed threshold CLE scheme is insecure against Type I adversaries.

Original languageEnglish
Title of host publication2010 International Conference on Computer Design and Applications, ICCDA 2010
PagesV5536-V5539
DOIs
StatePublished - 2010
Externally publishedYes
Event2010 International Conference on Computer Design and Applications, ICCDA 2010 - Qinhuangdao, Hebei, China
Duration: 25 Jun 201027 Jun 2010

Publication series

Name2010 International Conference on Computer Design and Applications, ICCDA 2010
Volume5

Conference

Conference2010 International Conference on Computer Design and Applications, ICCDA 2010
Country/TerritoryChina
CityQinhuangdao, Hebei
Period25/06/1027/06/10

Keywords

  • Certificateless encryption
  • Information security
  • Public key cryptography
  • Standard model

Fingerprint

Dive into the research topics of 'Cryptanalysis of a certificateless encryption scheme'. Together they form a unique fingerprint.

Cite this