Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited

Certificateless public key encryption (CLE) and certificate based encryption (CBE) are two novel public key cryptographic primitives requiring no authenticity verification of the recipient’s public key. Both of them are motivated to simultaneously solve the heavy certificate management problem inherent in the traditional public key encryption (PKE) and the key escrow problem inherent in the identity-based encryption (IBE). It is an attractive cryptographic task to formally explore the relation between CBE and CLE. In 2005, Al-Riyami and Paterson proposed one general conversion from CLE to CBE. Shortly later, Kang and Park pointed out a flaw in the security proof of AlRiyami-Paterson conversion. In 2012, Wu et al. proposed another generic conversion from CLE to CBE. Compared with Al-Riyami-Paterson conversion, Wu et al.’s method can be proved secure, but it has to additionally involve collision resistant hash functions. It remains an open problem whether the generic conversion due to Al-Riyami and Paterson, which is very neat, is provably secure. We aim to solve this open problem. First, we formalize CLE’s new security model, featured by introducing a new security property overlooked by previous security models. With this new security model as the basic technique, we succeed in proving that the Al-Riyami-Paterson generic Email addresses: sdgaowei@gmail.com (Wei Gao), guilin@uow.edu.au (Guilin Wang), kfchen@sjtu.edu.cn (Kefei Chen), wangxuyuyan@gmail.com (Xueli Wang ) This work is completed when the first author visited University of Wollongong (20112012) Preprint submitted to **** February 27, 2012 conversion from CLE to CBE is secure, if the CLE scheme is secure in our new security model. A concrete provably secure CBE scheme is presented to demonstrate the application of our result.

[1]  Pil Joong Lee,et al.  Identity-Based Cryptography in Public Key Management , 2004, EuroPKI.

[2]  Sanjit Chatterjee,et al.  Another Look at Tightness , 2011, IACR Cryptol. ePrint Arch..

[3]  Limin Shen,et al.  Efficient Revocable Certificateless Encryption Secure in the Standard Model , 2014, Comput. J..

[4]  Li Xu,et al.  A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption , 2012, Comput. J..

[5]  Paz Morillo,et al.  Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes , 2006, EuroPKI.

[6]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[7]  Jean-Jacques Quisquater,et al.  On Constructing Certificateless Cryptosystems from Identity Based Encryption , 2006, Public Key Cryptography.

[8]  Craig Gentry,et al.  Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.

[9]  Sattam S. Al-Riyami Cryptographic schemes based on elliptic curve pairings , 2004 .

[10]  Pil Joong Lee,et al.  Generic Construction of Certificateless Encryption , 2004, ICCSA.

[11]  Je Hong Park,et al.  Is it possible to have CBE from CL-PKE? , 2005, IACR Cryptol. ePrint Arch..

[12]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[13]  Kenneth G. Paterson,et al.  CBE from CL-PKE: A Generic Construction and Efficient Schemes , 2005, Public Key Cryptography.

[14]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[15]  Alexander W. Dent,et al.  A survey of certificateless encryption schemes and security models , 2008, International Journal of Information Security.

[16]  David Cooper,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.

[17]  Marc Girault,et al.  Self-Certified Public Keys , 1991, EUROCRYPT.

[18]  Limin Shen,et al.  Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles , 2014, Secur. Commun. Networks.

[19]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.