Title: Cryptanalysis and improvement on a certificateless encryption scheme in the standard model

Authors: Limin Shen; Futai Zhang; Yinxia Sun; Sujuan Li

Addresses: Jiangsu Engineering Research Center of Information Security and Privacy Protection Technology, School of Computer Science and Technology, Nanjing Normal University, Nanjing 210097, China ' Jiangsu Engineering Research Center of Information Security and Privacy Protection Technology, School of Computer Science and Technology, Nanjing Normal University, Nanjing 210097, China ' Jiangsu Engineering Research Center of Information Security and Privacy Protection Technology, School of Computer Science and Technology, Nanjing Normal University, Nanjing 210097, China ' College of Sciences, Nanjing University of Technology, Nanjing 210009, China

Abstract: Certificateless public key cryptography (CL-PKC) is an important type of public key cryptography, which effectively solves the inherent key escrow problem in identity-based public key cryptography. As the adversarial models in CL-PKC are relatively complex, designing efficient and secure certificateless encryption schemes in the standard model has been an interesting and challenging research topic. In this paper, we give cryptanalysis to an existing certificateless encryption scheme in the standard model. We show its insecurity by demonstrating two kinds of attacks. Then, we modify the original scheme to obtain a secure one. A rigorous security proof of the modified scheme is presented in the standard model based on the decisional bilinear Diffie-Hellman (DBDH) assumption and decisional truncated q-ABDHE assumption.

Keywords: certificateless encryption; cryptanalysis; bilinear pairing; standard model; malicious KGC; key generation centre; public key cryptography; key escrow problem; identity-based cryptography; information security.

DOI: 10.1504/IJICS.2014.068104

International Journal of Information and Computer Security, 2014 Vol.6 No.4, pp.354 - 371

Published online: 26 Mar 2015 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article