Research on Certificateless Public Key Cryptography

Certificateless public key cryptography (CL-PKC for short) is a new type of public key cryptography, which is developed on the foundation of identity based cryptography (ID-PKC for short). CL-PKC elimilates the key escrow problem and the need for public key certificate. These two advantages are what makes it attractive to the research community and industrial world form the beginning of its birth. It has been a very active research hot topic in the field of cryptology and information security. In about seven years, the study of CL-PKC has advanced step by step, making its theories and techniques more and more enriching. This paper revisits, analyzes, compares, and briefly reviews some of the main results. Furthermore, this study discusses some existing problems in this research field that deserve further investigation.

[1]  Kefei Chen,et al.  Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism , 2010, Inf. Sci..

[2]  C. Pandu Rangan,et al.  Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing , 2009, Inscrypt.

[3]  Kefei Chen,et al.  Practical Certificateless Aggregate Signatures from Bilinear Maps , 2008, J. Inf. Sci. Eng..

[4]  Joseph K. Liu,et al.  Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model , 2007, IACR Cryptol. ePrint Arch..

[5]  Kefei Chen,et al.  Certificateless threshold cryptosystem secure against chosen-ciphertext attack , 2007, Inf. Sci..

[6]  Robert H. Deng,et al.  Cryptanalysis of a certificateless signcryption scheme in the standard model , 2011, Inf. Sci..

[7]  Joseph K. Liu,et al.  Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.

[8]  Jean-Jacques Quisquater,et al.  On Constructing Certificateless Cryptosystems from Identity Based Encryption , 2006, Public Key Cryptography.

[9]  Kenneth G. Paterson,et al.  An Attack on a Certificateless Signature Scheme , 2006, IACR Cryptol. ePrint Arch..

[10]  C. Pandu Rangan,et al.  A note on the Certificateless Multi-receiver Signcryption Scheme , 2009, IACR Cryptol. ePrint Arch..

[11]  Je Hong Park,et al.  An attack on the certificateless signature scheme from EUC Workshops 2006 , 2006, IACR Cryptol. ePrint Arch..

[12]  Yanhua Hao,et al.  Cryptanalysis and Improvements of Two Certificateless Signature Schemes with Additional Properties , 2008, 2008 International Symposium on Computer Science and Computational Technology.

[13]  Jianhua Li,et al.  Two-party authenticated key agreement in certificateless public key cryptography , 2006, Wuhan University Journal of Natural Sciences.

[14]  Zhenfu Cao,et al.  Simulatability and security of certificateless threshold signatures , 2007, Inf. Sci..

[15]  Lei Zhang,et al.  Novel Efficient Certificateless Aggregate Signatures , 2009, AAECC.

[16]  Joonsang Baek,et al.  Certificateless Public Key Encryption Without Pairing , 2005, ISC.

[17]  Xu An Wang,et al.  Further Observations on Certificateless Public Key Encryption , 2009, Inscrypt.

[18]  Fagen Li,et al.  Certificateless threshold signature secure in the standard model , 2013, Inf. Sci..

[19]  Zhang Fu Certificateless Proxy Signature Scheme with Provable Security , 2009 .

[20]  Qiong Huang,et al.  Generic Certificateless Encryption in the Standard Model , 2007, IWSEC.

[21]  Qiuliang Xu,et al.  Two-Party Authenticated Key Agreement Protocol from Certificateless Public Key Encryption Scheme , 2009, 2009 International Conference on Management of e-Commerce and e-Government.

[22]  Joonsang Baek,et al.  Strongly Secure Certificateless Public Key Encryption Without Pairing , 2007, CANS.

[23]  Wei Wu,et al.  A Provably Secure Ring Signature Scheme in Certificateless Cryptography , 2007, ProvSec.

[24]  Li Ling,et al.  General and Efficient Certificateless Public Key Encryption Constructions , 2007, Pairing.

[25]  Bok-Min Goi,et al.  Cryptanalysis of Some Proxy Signature Schemes Without Certificates , 2007, WISTP.

[26]  Qiong Huang,et al.  Generic Certificateless Key Encapsulation Mechanism , 2007, ACISP.

[27]  Pil Joong Lee,et al.  Generic Construction of Certificateless Encryption , 2004, ICCSA.

[28]  C. Pandu Rangan,et al.  Efficient and Provably Secure Certificateless Multi-receiver Signcryption , 2008, ProvSec.

[29]  Yi Mu,et al.  Cryptanalysis and improvement of an efficient certificateless signature scheme , 2008, Journal of Communications and Networks.

[30]  Dengguo Feng,et al.  Key Replacement Attack on a Certificateless Signature Scheme , 2006, IACR Cryptol. ePrint Arch..

[31]  Jianfeng Ma,et al.  Provable efficient certificateless group key exchange protocol , 2006, Wuhan University Journal of Natural Sciences.

[32]  Kyung-Ah Shim,et al.  Breaking the short certificateless signature scheme , 2009, Inf. Sci..

[33]  Jian Weng,et al.  Certificateless key-insulated signature without random oracles , 2009 .

[34]  Zhenfu Cao,et al.  Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing , 2008, Int. J. Netw. Secur..

[35]  Lei Zhang,et al.  A new certificateless aggregate signature scheme , 2009, Comput. Commun..

[36]  Futai Zhang,et al.  An Improved secure certificateless authenticated group key agreement protocol , 2009, 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems.

[37]  Dong Hoon Lee,et al.  Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles) , 2007, Pairing.

[38]  Daniel R. Simon,et al.  Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.

[39]  Lei Zhang,et al.  Security Model for Certificateless Aggregate Signature Schemes , 2008, 2008 International Conference on Computational Intelligence and Security.

[40]  Colin Boyd,et al.  Strongly Secure Certificateless Key Agreement , 2009, Pairing.

[41]  Colleen M. Swanson,et al.  Security in Key Agreement: Two-Party Certificateless Schemes , 2008 .

[42]  Jianhua Li,et al.  Constructing Efficient Certificateless Public Key Encryption with Pairing , 2008, Int. J. Netw. Secur..

[43]  David Jao,et al.  A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols , 2009, INDOCRYPT.

[44]  Meng Gao,et al.  A Secure Certificateless Authenticated Group Key Agreement Protocol , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[45]  Junzuo Lai,et al.  Self-Generated-Certificate Public Key Encryption Without Pairing , 2007, Public Key Cryptography.

[46]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[47]  Richard Comley,et al.  Efficient Certificateless Public Key Encryption , 2005, IACR Cryptol. ePrint Arch..

[48]  Zhixiong Chen,et al.  A New Efficient Certificateless Signcryption Scheme , 2008, 2008 International Symposium on Information Science and Engineering.

[49]  Qiuliang Xu,et al.  Constructing Secure Two-Party Authenticated Key Agreement Protocol Based on Certificateless Public Key Encryption Scheme , 2009, 2009 4th International Conference on Computer Science & Education.

[50]  Qiuliang Xu,et al.  Key Replicating Attack on Certificateless Authenticated Key Agreement Protocol , 2009, 2009 Asia-Pacific Conference on Information Processing.

[51]  Kwangjo Kim,et al.  Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[52]  Dong Hoon Lee,et al.  Efficient Revocation of Security Capability in Certificateless Public Key Cryptography , 2005, KES.

[53]  Yi Mu,et al.  Certificateless Signature Revisited , 2007, ACISP.

[54]  Kefei Chen,et al.  Two Certificateless Aggregate Signatures From Bilinear Maps , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).

[55]  Qiaoyan Wen,et al.  Efficient and provably-secure certificateless short signature scheme from bilinear pairings , 2009, Comput. Stand. Interfaces.

[56]  Xinyi Huang,et al.  Efficient and Short Certificateless Signature , 2008, CANS.

[57]  Dengguo Feng,et al.  On the Security of a Certificateless Public-Key Encryption , 2005, IACR Cryptol. ePrint Arch..

[58]  Yi Mu,et al.  Malicious KGC Attack in Certificateless Cryptography , 2006 .

[59]  Dong Hoon Lee,et al.  Efficient Certificateless Signature Schemes , 2007, ACNS.

[60]  Kee-Young Yoo,et al.  A Certificateless Authenticated Group Key Agreement Protocol Providing Forward Secrecy , 2008, 2008 International Symposium on Ubiquitous Multimedia Computing.

[61]  Ashutosh Saxena,et al.  An Efficient Certificateless Signature Scheme , 2005, CIS.

[62]  Yuqing Zhang,et al.  A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).

[63]  Qiu-Liang Xu,et al.  On the security of certificateless authenticated key agreement protocol , 2009, 2009 IEEE International Symposium on IT in Medicine & Education.

[64]  Willy Susilo,et al.  Cryptanalysis on Two Certificateless Signature Schemes , 2010, Int. J. Comput. Commun. Control.

[65]  Rosario Gennaro,et al.  Certificateless onion routing , 2009, CCS.

[66]  Colin Boyd,et al.  Efficient Certificateless KEM in the Standard Model , 2009, ICISC.

[67]  Young-Ran Lee,et al.  An Authenticated Certificateless Public Key Encryption Scheme , 2004, IACR Cryptol. ePrint Arch..

[68]  Kenneth G. Paterson,et al.  Certificateless Encryption Schemes Strongly Secure in the Standard Model , 2008, Public Key Cryptography.

[69]  Lei Zhang,et al.  New Efficient Certificateless Signature Scheme , 2007, EUC Workshops.

[70]  Eike Kiltz,et al.  Compact CCA-Secure Encryption for Messages of Arbitrary Length , 2009, Public Key Cryptography.

[71]  Chen Hu,et al.  Certificateless Aggregate Signature Scheme , 2010, 2010 International Conference on E-Business and E-Government.

[72]  Fagen Li,et al.  Certificateless hybrid signcryption , 2009, Math. Comput. Model..

[73]  Lei Zhang,et al.  Certificateless signature and blind signature , 2008 .

[74]  Lein Harn,et al.  Design of DL-based certificateless digital signatures , 2009, J. Syst. Softw..

[75]  Lei Zhang,et al.  Cryptanalysis of a Certificateless Multi-receiver Signcryption Scheme , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[76]  Duncan S. Wong,et al.  Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.

[77]  Fagen Li,et al.  Simulatability and Security of Certificateless Threshold Signatures without Random Oracles , 2008, 2008 International Conference on Computational Intelligence and Security.

[78]  Kenneth G. Paterson,et al.  CBE from CL-PKE: A Generic Construction and Efficient Schemes , 2005, Public Key Cryptography.

[79]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[80]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[81]  Shanshan Duan,et al.  Certificateless undeniable signature scheme , 2008, Inf. Sci..

[82]  Guoyan Zhang,et al.  Certificateless threshold decryption scheme secure in the standard model , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[83]  Xiangxue Li,et al.  Certificateless signature and proxy signature schemes from bilinear pairings , 2005 .

[84]  Zhang Zhang,et al.  Efficient and provably secure certificateless signcryption from bilinear maps , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[85]  Chun-I Fan,et al.  Cryptanalysis on Du-Wen Certificateless Short Signature Scheme , 2009 .

[86]  Xiaotie Deng,et al.  Key Replacement Attack Against a Generic Construction of Certificateless Signature , 2006, ACISP.

[87]  Meng Gao,et al.  An Efficient Certificateless Authenticated Tripartite Key Agreement Protocol , 2009, 2009 International Conference on Management and Service Science.

[88]  Lei Zhang,et al.  Efficient many-to-one authentication with certificateless aggregate signatures , 2010, Comput. Networks.

[89]  Chik How Tan,et al.  Certificateless Authenticated Two-Party Key Agreement Protocols , 2006, ASIAN.

[90]  Pooya Farshim,et al.  Generic Constructions of Identity-Based and Certificateless KEMs , 2008, Journal of Cryptology.

[91]  Yi Mu,et al.  Certificateless Threshold Ring Signature , 2009, Inf. Sci..

[92]  Wang Shengbao,et al.  Efficient certificateless authenticated key agreement protocol from pairings , 2006, Wuhan University Journal of Natural Sciences.

[93]  Liang Xia,et al.  Breaking and repairing the certificateless key agreement protocol from ASIAN 2006 , 2008, Wuhan University Journal of Natural Sciences.

[94]  Sherman S. M. Chow,et al.  Certificateless Ring Signatures , 2007, IACR Cryptol. ePrint Arch..

[95]  Shaozhen Chen,et al.  A Concrete Certificateless Signature Scheme without Pairings , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[96]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[97]  Yupu Hu,et al.  Certificateless signcryption scheme in the standard model , 2010, Inf. Sci..

[98]  Rui Zhang,et al.  An efficient and provably‐secure certificateless signature scheme without bilinear pairings , 2012, Int. J. Commun. Syst..

[99]  Sattam S. Al-Riyami Cryptographic schemes based on elliptic curve pairings , 2004 .

[100]  C. Pandu Rangan,et al.  Certificateless KEM and Hybrid Signcryption Schemes Revisited , 2010, ISPEC.

[101]  C. Pandu Rangan,et al.  CCA secure certificateless encryption schemes based on RSA , 2011, Proceedings of the International Conference on Security and Cryptography.

[102]  Paulo S. L. M. Barreto,et al.  Toward Efficient Certificateless Signcryption from (and without) Bilinear Pairings , 2008, Anais do VIII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2008).

[103]  Robert H. Deng,et al.  RSA-Based Certificateless Public Key Encryption , 2009, ISPEC.

[104]  Yi Mu,et al.  On the Security of Certificateless Signature Schemes from Asiacrypt 2003 , 2005, CANS.

[105]  Yi Mu,et al.  Certificateless threshold signature scheme from bilinear maps , 2010, Inf. Sci..

[106]  Qiong Huang,et al.  Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model , 2010, Journal of Computer Science and Technology.

[107]  Sun,et al.  Secure Certificateless Encryption with Short Ciphertext , 2010 .

[108]  Alexander W. Dent,et al.  A survey of certificateless encryption schemes and security models , 2008, International Journal of Information Security.

[109]  Manuel Barbosa,et al.  Certificateless signcryption , 2008, ASIACCS '08.

[110]  Paz Morillo,et al.  Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes , 2006, EuroPKI.

[111]  Lei Zhang,et al.  A New Provably Secure Certificateless Signature Scheme , 2008, 2008 IEEE International Conference on Communications.

[112]  Xiaolei Dong,et al.  Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model , 2009, Inscrypt.

[113]  Da Li,et al.  Certificateless Signature Scheme without Random Oracles , 2009, ISA.

[114]  Gao Meng,et al.  Key-Compromise Impersonation Attacks on Some Certificateless Key Agreement Protocols and Two Improved Protocols , 2009, 2009 First International Workshop on Education Technology and Computer Science.

[115]  Rongbo Lu,et al.  Cryptanalysis and Improvement of a Certificateless Proxy Signature Scheme from Bilinear Pairings , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).