Efficient Certificateless KEM in the Standard Model
نویسندگان
چکیده
We give a direct construction of a certificateless key encapsulation mechanism (KEM) in the standard model that is more efficient than the generic constructions proposed before by Huang and Wong [9]. We use a direct construction from Kiltz and Galindo’s KEM scheme [10] to obtain a certificateless KEM in the standard model; our construction is roughly twice as efficient as the generic construction.
منابع مشابه
Generic Certificateless Key Encapsulation Mechanism
We propose the first generic construction of certificateless key encapsulation mechanism (CL-KEM) in the standard model, which is also secure against malicious-but-passive KGC attacks. It is based on an ID-based KEM, a public key encryption and a message authentication code. The high efficiency of our construction is due to the efficient implementations of these underlying building blocks, and ...
متن کاملAn efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کاملCertificateless KEM and Hybrid Signcryption Schemes Revisited
Often authentication and confidentiality are required as simultaneous key requirements in many cryptographic applications. The cryptographic primitive called signcryption effectively implements the same and while most of the public key based systems are appropriate for small messages, hybrid encryption (KEM-DEM) provides an efficient and practical way to securely communicate very large messages...
متن کاملCertificateless Hybrid Signcryption
Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. In this paper, we address a question whether it is possible to construct a hybrid signcryption scheme in the certificateless setting. This question seems t...
متن کاملKeccak MD Hash Algorithm Based Tag Kem for Certificateless Hybrid Signcryption
This paper presents a novel idea to implement Key Encapsulation Mechanism (KEM) in a CL hybrid encryption setting to provide security to the key itself, before the actual data encryption of long message. Tag-KEM (Key Encapsulation Mechanism with a tag) is an authenticated method for generic construction of hybrid encryption. TagKEM (TKEM) allows the sender to encapsulate a symmetric key along w...
متن کامل