Threshold Certificate-based Encryption
نویسندگان
چکیده
Certificate-based encryption (CBE) is a new asymmetric encryption paradigm which combines traditional public-key encryption (PKE) and identity based encryption (IBE) while preserving some of their most attractive features. CBE provides an efficient implicit certificate mechanism to eliminate third-party queries for the certificate status and to simply the certificate revocation problem. Therefore, CBE can be used to construct an efficient PKI requiring fewer infrastructures. In addition, it also solves the key escrow problem and key distribution problem inherent in IBE. In this paper, we introduce a new notion called Threshold Certificate-Based Encryption (TCBE) to overcome the limitations of CBE due to the using of sole master key in the system. It preserves the advantages of CBE such as implicit certificate and no private key escrow. At the same time it inherits the properties of threshold encryption. We first formalize the definition and security model for TCBE. Then we propose a concrete TCBE scheme and prove it to be CCA-secure under the Decisional Bilinear Diffie-Hellman assumption in the standard model.
منابع مشابه
The Proceedings of the 10 th Australian Digital Forensics
Secure Key Deployment and Exchange Protocol (SKYE) is an innovative encryption Key Management Scheme (KMS) based on a combination of features from recent protocols combined with new features for Mobile Ad Hoc Networks (MANETs). The design focuses on a truly ad hoc networking environment where geographical size of the network, numbers of network members and mobility of the members is all unknown...
متن کاملCertificate-Based Encryption and the Certificate Revocation Problem
We introduce the notion of certificate-based encryption. In this model, a certificate – or, more generally, a signature – acts not only as a certificate but also as a decryption key. To decrypt a message, a keyholder needs both its secret key and an up-to-date certificate from its CA (or a signature from an authorizer). Certificate-based encryption combines the best aspects of identity-based en...
متن کاملEfficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model
Certificate-based encryption is a useful primitive that combines traditional public key encryption and identity-based encryption while preserving some of their most attractive features. It not only simplifies the cumbersome certificate management in traditional PKI, but also solves the key escrow problem inherent in identity-based encryption. In this paper, we propose a new certificate-based en...
متن کاملCertificate-based Smooth Projective Hashing and Its Applications
Smooth projective hashing was firstly introduced by Cramer and Shoup (EuroCrypt’02) as a tool to construct efficient chosen-ciphertext-secure public key encryption schemes. Since then, they have found many other applications, such as password-based authenticated key exchange, oblivious transfer, zero-knowledge arguments et al. Certificate-based encryption (CBE) not only eliminates third-party q...
متن کاملConstructing Pairing-free Certificate-based Encryption
Certificate-based cryptography is a new paradigm that combines traditional public-key cryptography and identity-based cryptography. It not only simplifies the cumbersome certificate management in traditional public-key cryptography, but also eliminates the key escrow and distribution problems inherent in identity-based cryptography. However, all constructions of certificate-based encryption in ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JSW
دوره 4 شماره
صفحات -
تاریخ انتشار 2009