Distributed certificateless key encapsulation mechanism secure against the adaptive adversary

Yu Long*, Xiang Xue Li, Ke Fei Chen, Xuan Hong

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

This paper proposes an adaptively secure solution to certificateless distributed key encapsulation mechanism from pairings by using Canetti's adaptive secure key generation scheme based on discrete logarithm. The proposed scheme can withstand adaptive attackers that can choose players for corruption at any time during the run of the protocol, and this kind of attack is powerful and realistic. In contrast, all previously presented threshold certificateless public key cryptosystems are proven secure against the more idealized static adversaries only. They choose and fix the subset of target players before running the protocol. We also prove security of this scheme in the random oracle model. Copyright.

Original languageEnglish
Pages (from-to)102-106
Number of pages5
JournalJournal of Shanghai Jiaotong University (Science)
Volume14 E
Issue number1
DOIs
StatePublished - Feb 2009
Externally publishedYes

Keywords

  • Adaptive security
  • Certificateless key encapsulation mechanism
  • Chosen-ciphertext attack

Fingerprint

Dive into the research topics of 'Distributed certificateless key encapsulation mechanism secure against the adaptive adversary'. Together they form a unique fingerprint.

Cite this