无证书公钥密码体制研究
作者:
基金项目:

国家自然科学基金(60673070); 江苏省自然科学基金(BK2006217); 南京工业大学青年教师学术基金(39704023)


Research on Certificateless Public Key Cryptography
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [120]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    无证书公钥密码体制(certificateless public key cryptography,简称CL-PKC)是在基于身份的公钥密码体制(identity-based public key cryptography,简称ID-PKC)的基础上提出来的一种新型公钥密码体制,没有密钥托管问题、不需要使用公钥证书,使得无证书公钥密码体制从其概念提出的初始就受到了学术界和工业界的极大关注.从2003 年至今,它一直是密码学和信息安全领域非常活跃的研究热点.其理论和技术在不断地丰富和发展.到目前为止,已经积累了大量的研究成果.将对这些成果进行较为系统的整理、分析、比较和简要的评述,并探讨该领域研究尚存在的不足及值得进一步研究的问题.

    Abstract:

    Certificateless public key cryptography (CL-PKC for short) is a new type of public key cryptography, which is developed on the foundation of identity based cryptography (ID-PKC for short). CL-PKC elimilates the key escrow problem and the need for public key certificate. These two advantages are what makes it attractive to the research community and industrial world form the beginning of its birth. It has been a very active research hot topic in the field of cryptology and information security. In about seven years, the study of CL-PKC has advanced step by step, making its theories and techniques more and more enriching. This paper revisits, analyzes, compares, and briefly reviews some of the main results. Furthermore, this study discusses some existing problems in this research field that deserve further investigation.

    参考文献
    [1] Diffie W, Hellman ME. New directions in cryptography. IEEE Trans. on Information Theory, 1976,22(6):644?654.
    [2] Shamir A. Identity-Based cryptosystems and signature schemes. In: Blakely GR, Chaum D, eds. Advances in Cryptology-Crypto’84. LNCS 196. Heidelberg: Springer-Verlag, 1985. 47?53.
    [3] Al-Riyami SS, Paterson KG. Certificateless public key cryptography. In: Laih CS, ed. Proc. of the ASIACRYPT 2003. LNCS 2894, Berlin: Springer-Verlag, 2003. 452?473.
    [4] Cheng ZH, Comley R. Efficient certificateless public key encryption. Report, 2005/012, Cryptology ePrint Archive, London: Middlesex University, 2005. http://eprint.iacr.org/2005/012
    [5] Dent AW. A survey of certificateless encryption schemes and security models. Int’l Journal of Information Security, 2007,7(5): 349?377. [doi: 10.1007/s10207-008-0055-0]
    [6] Baek J, Safavi-Naini R, Susilo W. Certificateless public key encryption without pairing. In: Zhou J, Lopez J, Deng RH, Bao F, eds. Proc. of the ISC 2005. LNCS 3650, Heidelberg: Springer-Verlag, 2005. 134?148.
    [7] Rackoff C, Simon DR. Non-Interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum J, ed. Proc. of the Crypto’91. LNCS 576, Heidelberg: Springer-Verlag, 1991. 433?444. [doi: 10.1007/3-540-46766-1_35]
    [8] Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols. In: Ashby V, Denning D, eds. Proc. of the ACM CCS’93. New York: ACM Press, 1993. 62?73. [doi: 1145/168588.168596]
    [9] Al-Riyami SS, Paterson KG. CBE from CL-PKE: A generic construciton and efficient schemes. In: Vaudenay S, ed. Proc. of the PKC 2005. LNCS 3386, Berlin: Springer-Verlag, 2005. 398?415. [doi: 10.1007/978-3-540-30580-4_27]
    [10] Libert B, Quisquater JJ. On constructing certificateless cryptosystems from identity based encryption. In: Yung M, Dodis Y, Kiayias A, Malkin TG, eds. Proc. of the PKC 2006. LNCS 3958, New York, Berlin: Springer-Verlag, 2006. 474?490.
    [11] Zhang ZF, Feng DG. On the security of a certificateless public-key encryption. Report 2005/426, Cryptology ePrint Archive, 2005. http://eprint.iacr.org/2005/426
    [12] Shi YJ, Li JH, Shi JJ. Constructing efficient certificateless public key encryption with pairing. Int’l Journal of Network Security, 2008,6(1): 26?32.
    [13] Sun YX, Zhang FT, Baek J. Strongly secure certificateless public key encryption without pairing. In: Zhou J, Lopez J, Deng RH, Bao F, eds. Proc. of the CANS 2007. LNCS 4856, Berlin: Springer-Verlag, 2007. 194?208. [doi: 10.1007/978-3-540-76969-9_13]
    [14] Lai JZ, Kou WD. Self-Generated-Certificate public key encryption without pairing. In: Okamoto T, Wang X, eds. Proc. of the PKC 2007. LNCS 4450, Berlin: Springer-Verlag, 2007. 476?489. [doi: 10.1007/978-3-540-71677-8_31]
    [15] Liu JK, Au MH, Susilo W. Self-Generated-Certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In: Bao F, Miller S, Deng R, Samarati P, eds. Proc. of the 2nd ACM Symp. on Information, Computer and Communications Security. New York: ACM Press, 2007. 273?283. [doi:10.1145/1229285.1266994]
    [16] Wang XA, Huang XY, Yang XY. Further observations on certificateless public key encryption. In: Yung M, Liu P, Lin D, eds. Proc. of the Inscrypt 2008. LNCS 5487, Berlin: Springer-Verlag, 2009. 217?239. [doi: 10.1007/978-3-642-01440-6_18]
    [17] Sun YX, Zhang FT. Secure certificateless encryption with short ciphertext. Chinese Journal of Electronics, 2010,19(2):313?318.
    [18] Lai JZ, Deng RH, Liu SL, Kou WD. RSA-Based certificateless public key encryption. In: Bao F, Li H, Wang G, eds. Proc. of the ISPEC 2009. LNCS 5451, Berlin: Springer-Verlag, 2009. 24?34. [doi: 10.1007/978-3-642-00843-6_3]
    [19] Selvi SSD, Vivek SS, Rangan CP.CCA2 secure certificateless encryption schemes based on RSA. Report 2010/459, Cryptology ePrint Archive, 2010. http://eprint.iacr.org/2010/459
    [20] Lee YR, Lee HS. An authenticated certificateless public key encryption scheme. Trends in Mathematics Information Center for Mathematical Sciences, 2005,8(1):177?187.
    [21] Ju HS, Kim DY, Lee DH, Lim J, Chun K. Efficient revocation of security capability in certificateless public key cryptography. In: Khosla R, Howlett RJ, Jain LC, eds. Proc. of the KES 2005. LNAI 3682, Heidelberg: Springer-Verlag, 2005. 453?459.
    [22] Park JH, Choi KY, Hwang JY, Lee DH. Certificateless public key encryption in the selective-ID security model (without random oracles). In: Takagi T, Okamoto T, Okamoto E, Okamoto T, eds. Proc. of the Pairing 2007. LNCS 4575, Heidelberg: Springer- Verlag, 2007. 60?82. [doi: 10.1007/978-3-540-73489-5_5]
    [23] Dent AW, Libert B, Paterson KG. Certificateless encryption schemes strongly secure in the standard model. In: Cramer R, eds. Proc. of the PKC 2008. LNCS 4939, Heidelberg: Springer-Verlag, 2008. 344?359. [doi: 10.1007/978-3-540-78440-1_20]
    [24] Au MH, Chen J, Liu J K, Mu Y, Wong DS, Yang G. Malicious KGC attack in certificateless cryptography. In: Bao F, Miller S, eds. Proc. of the ACM Symp. on Information, Computer and Communications Security (ASIACCS 2007). New York: ACM Press, 2007. 302?311. [doi: 10.1145/1229285.1266997]
    [25] Hwang YH, Liu JK, Chow SSM. Certificateless public key encryption secure against malicious KGC attacks in the standard model. Journal of Universal Computer Science, Special Issue on Cryptography in Computer System Security, 2008,14(3):463?480.
    [26] Al-Riyami SS. Cryptographic schemes based on elliptic curve pairings [Ph.D. Thesis]. University of London, 2004.
    [27] Yum DH, Lee PJ. Generic construction of certificateless encryption. In: Laganà A, Gavrilova M, Kumar V, Mun Y, Tan CJK, Gervasi O, eds. Proc. of the ICCSA 2004. LNCS 3043, Fukuoka, Heidelberg: Springer-Verlag, 2004. 802?811. [doi: 10.1007/978-3-540-24707-4_93]
    [28] Galindo D, Morillo P, Ràfols C. Breaking Yum and Lee generic constructions of certificateless and certificate-based encryption schemes. In: Atzeni AS, Lioy A, eds. Proc. of the EuroPKI 2006. LNCS 4043, Heidelberg: Springer-Verlag, 2006. 81?91. [doi: 10.1007/11774716_7]
    [29] Bentahar K, Farshim P, Malone-Lee J, Smart NP. Generic constructions of identity-based and certificateless KEMs. Report 2005/058, Cryptology ePrint Archive, 2005. http://eprint.iacr.org/2005/058
    [30] Bentahar K, Farshim P, Malone-Lee J, Smart NP. Generic constructions of identity-based and certificateless KEMs. Journal of Cryptology, 2008,21(2):178?199. [doi: 10.1007/s00145-007-9000-z]
    [31] Cheng ZH, Chen LQ, Ling L, Comley RA. General and efficient certificateless public key encryption constructions. In: Takagi T, Okamoto T, Okamoto E, Okamoto T, eds. Proc. of the Pairing 2007. LNCS 4575, Heidelberg: Springer-Verlag, 2007. 83?107. [doi: 10.1007/978-3-540-73489-5_6]
    [32] Huang Q, Wong DS. Generic certificateless encryption in the standard model. In: Miyaji A, Rannenberg K, eds. Proc. of the IWSEC 2007. LNCS 4572, Heidelberg: Springer-Verlag, 2007. 278?291. [doi: 10.1007/978-3-540-75651-4_19]
    [33] Huang Q, Wong DS. Generic certificateless encryption secure against malicious-but-passive KGC attacks in the standard model. Journal of Computer Science and Technology, 2010,25(4):807?826. [doi: 10.1007/s11390-010-9367-4]
    [34] Huang Q, Wong DS. Generic certificateless key encapsulation mechanism. In: Pieprzyk J, Ghodosi H, Dawson E, eds. Proc. of the ACISP 2007. LNCS 4586, Heidelberg: Springer-Verlag, 2007. 215?229. [doi: 10.1007/978-3-540-73458-1_17]
    [35] Lippold G, Boyd C, Nieto JMG. Efficient certificateless KEM in the standard model. In: Lee D, Hong S, eds. Proc. of the ICISC 2009. LNCS 5984, Heidelberg: Springer-Verlag, 2010. 34?46. [doi: 10.1007/978-3-642-14423-3_3]
    [36] Abe M, Kiltz E, Okamoto T. Compact CCA-secure encryption for messages of arbitrary length. In: Jarecky S, Tsudik G, eds. Proc. of the PKC 2009. LNCS 5443, Heidelberg: Springer-Verlag, 2009. 377?392. [doi: 10.1007/978-3-642-00468-1_21]
    [37] Huang XY, Susilo W, Mu Y, Zhang FT. On the security of certificateless signature schemes from asiacrypt 2003. In: Desmedt YG, Wang H, Mu Y, Li Y, eds. Proc. of the CANS 2005. LNCS 3810, Heidelberg: Springer-Verlag, 2005. 13?25. [doi: 10.1007/11599371_2]
    [38] Yap W, Heng S, Goi B. An efficient certificateless signature scheme. In: Zhou X, Sokolsky O, Yan L, Jung ES, Shao Z, Mu Y, Lee DC, Kim D, Jeong YS, Xu CZ, eds. Proc. of the EUC Workshops 2006. LNCS 4097, Heidelberg: Springer-Verlag, 2006. 322?331. [doi: 10.1007/11807964_33]
    [39] Park JH. An attack on the certificateless signature scheme from EUC Workshops 2006. Report 2006/442, Cryptology ePrint Archive, 2006. http://eprint.iacr.org/2006/442.pdf
    [40] Zhang ZF, Feng DG. Key replacement attack on a certificateless signature scheme. Report 2006/453, Cryptology ePrint Archive, 2006. http://eprint.iacr.org/2006/453.pdf
    [41] Li JG, Huang XY, Mu Y, Wu W. Cryptanalysis and improvement of an efficient certificateless signature scheme. Journal of Communications and Networks, 2008,10(1):10?17.
    [42] Zhang ZF, Wong DS, Xu J, Feng DG. Certificateless public-key signature: Security model and efficient construction. In: Zhou J, Yung M, Bao F, eds. Proc. of the ACNS 2006. LNCS 3989, Heidelberg: Springer-Verlag, 2006. 293?308. [doi: 10.1007/11767480_20]
    [43] Huang XY, Mu Y, Susilo W, Wong DS, Wu W. Certificateless signature revisited. In: Pieprzyk J, Ghodosi H, Dawson E, eds. Proc. of the ACISP 2007. LNCS 4586, Heidelberg: Springer-Verlag, 2007. 308?322. [doi: 10.1007/978-3-540-73458-1_23]
    [44] Gorantla MC, Saxena A. An efficient certificateless signature scheme. In: Hao Y, Liu J, Wang YP, Cheung YM, Yin H, Jiao L, Ma J, Jiao JC, eds. Proc. of the CIS 2005. LNAI 3802, Heidelberg: Springer-Verlag, 2005. 110?116. [doi: 10.1007/11596981_16]
    [45] Cao XF, Paterson KG, Kou WD. An attack on a certificateless signature scheme. Report 2006/367, Cryptology ePrint Archive, 2006. http://eprint.iacr.org/2006/367.pdf
    [46] Harn L, Ren J, Lin CL. Design of DL-based certificateless digital signatures. Journal of Systems and Software, 2009,82(5):789?793. [doi: 10.1016/j.jss.2008.11.844]
    [47] Choi KY, Park JH, Hwang JY, Lee DH. Efficient certificateless signature schemes. In: Katz J, Yung M, eds. Proc. of the ACNS 2007. LNCS 4521, Heidelberg: Springer-Verlag, 2007. 443?458. [doi: 10.1007/978-3-540-72738-5_29]
    [48] Yuan YM, Li D, Tian LW, Zhu HS. Certificateless signature scheme without random oracles. In: Park JH, et al., eds. Proc. of the ISA 2009. LNCS 5576, Heidelberg: Springer-Verlag, 2009. 31?40. [doi: 10.1007/978-3-642-02617-1_4]
    [49] Shim KA. Breaking the short certificateless signature scheme. Information Sciences, 2009,179(3):303?306. [doi: 10.1016/j.ins. 2008.08.024]
    [50] Du HZ, Wen QY. Efficient and provably-secure certificateless short signature scheme from bilinear pairings. Computer Standards & Interfaces, 2009,31(2):390?394. [doi: 10.1016/j.csi.2008.05.013]
    [51] Fan CT, Hsu RH, Ho PH. Cryptanalysis on Du-Wen certificateless short signature scheme. In: Kim KJ, et al., eds. Proc. of the 4th Joint Workshop on Information Security (JWIS 2009). Kaohsiung: Institute of Electrical and Electronics Engineers Inc, 2009. 1?7.
    [52] Tso RL, Yi X, Huang XY. Efficient and short certificateless signature. In: Franklin MK, Hui LCK, Wong DS, eds. Proc. of the CANS 2008. LNCS 5339, Heidelberg: Springer-Verlag, 2008. 64?79. [doi: 10.1007/978-3-540-89641-8_5]
    [53] Zhang L, Zhang FT, Zhang FG. New efficient certificateless signature scheme. In: Denko M, et al., eds. Proc. of the EUC Workshops 2007. LNCS 4809, Heidelberg: Springer-Verlag, 2007. 692?703. [doi: 10.1007/978-3-540-77090-9_64]
    [54] Hu BC, Wong DS, Zhang ZF, Deng XT. Key replacement attack against a generic construction of certificateless signature. In: Batten LM, Safavi-Naini R, eds. Proc. of the ACISP 2006. LNCS 4058, Heidelberg: Springer-Verlag, 2006. 235?246.
    [55] Zhang L, Zhang FT. A new provably secure certificateless signature scheme. In: Wu J, et al., eds. Proc. of the IEEE ICC 2008. Piscataway: Institute of Electrical and Electronics Engineers Inc., 2008. 1685?1689. [doi: 10.1109/ICC.2008.325]
    [56] Zhang L, Zhang FT. Certificateless signature and blind signature. Journal of Electronics, 2008,25(5):629?635.
    [57] Wan ZM, Lai XJ, Weng J, Liu SL, Long Y, Hong X. Certificateless key-insulated signature without random oracles. Journal of Zhejiang University Science A, 2009,10(12):1790?1800.
    [58] Zhang F, Li S, Miao S, Mu Y, Susilo W, Huang X. Cryptanalysis on two certificateless signature schemes, Int’l Journal of Computers, Communications & Control, 2010,5(4):586?591.
    [59] Ge AJ, Chen SZ, Huang XY. A concrete certificateless signature scheme without pairings. In: Wang L, et al., eds. Proc. of the 2009 Int’l Conf. on Multimedia Information Networking and Security, IEEE Computer Society, 2009. 374?377. [doi: 10.1109/MINES.2009.100]
    [60] He DB, Chen JH, Zhang R. Efficient and provably-secure certificateless signature scheme without bilinear pairings. Report 2010/632, Cryptology ePrint Archive, 2010. http://eprint.iacr.org/2010/632.pdf
    [61] Zhang L, Zhang FT, Wu W. A provably secure ring signature scheme in certificateless cryptography. In: Susilo W, Liu JK, Mu Y, eds. Proc. of the ProvSec 2007. LNCS 4784, Heidelberg: Springer-Verlag, 2007. 103?121. [doi: 10.1007/978-3-540-75670-5_7]
    [62] Chow SS, Yap WS. Certificateless ring signatures. Report 2007/236, Cryptology ePrint Archive, 2007. http://eprint.iacr.org/2007/236.pdf
    [63] Gong Z, Long Y, Hong X, Chen KF. Two certificateless aggregate signatures from bilinear maps. In: Feng WY, Gao F, eds. Proc. of the IEEE SNPD 2007, Vol.3. IEEE Computer Society, 2007. 188?193. [doi: 10.1109/SNPD.2007.132]
    [64] Zhang L, Zhang FT. Security model for certificateless aggregate signature schemes. In: Wang Y, et al., eds. Proc. of the IEEE CIS 2008. Suzhou: IEEE Computer Society, 2008. 364?368. [doi: 10.1109/CIS.2008.9]
    [65] Zhang L, Zhang FT. A new certificateless aggregate signature scheme. Computer Communications, 2009,32(6):1079?1085. [doi: 10.1016/j.comcom.2008.12.042]
    [66] Zhang L, Qin B, Wu QH, Zhang FT. Novel efficient certificateless aggregate signatures. In: Bras-Amorós M, H?holdt T, eds. Proc. of the 18th Int’l Symp. on Applied Algebra, Algebraic Algorithms, and Error-Correcting Codes (AAECC-18). LNCS 5527, Heidelberg: Springer-Verlag, 2009. 235?238. [doi: 10.1007/978-3-642-02181-7_28]
    [67] Chen H, Song WG, Zhao B. Certificateless aggregate signature scheme. In: Xie S, et al., eds. Proc. of the 2010 Int’l Conf. on E-Business and E-Government (ICEE). IEEE Computer Society, 2010. 3790?3793. [doi: 10.1109/ICEE.2010.950]
    [68] Gong Z, Long Y, Hong X, Chen KF. Practical certificateless aggregate signatures from bilinear maps. Journal of Information Science and Engineering, 2010,26(6):2093?2106.
    [69] Zhang L, Qin B, Wu QH, Zhang FT. Efficient many-to-one authentication with certificateless aggregate signatures. Computer Networks, 2010,54(14):2482?2491. [doi: 10.1016/j.comnet.2010.04.008]
    [70] Li X, Chen K, Sun L. Certificateless signature and proxy signature schemes from bilinear pairings. Lithuanian Mathematical Journal, 2005,45(1):76?83. [doi: 10.1007/s10986-005-0008-5]
    [71] Lu RB, He D, Wang CJ. Cryptanalysis and Improvement of a certificateless proxy signature scheme from bilinear pairings. In: Feng W, Gao F, eds. Proc. of the IEEE SNPD 2007. IEEE Computer Society, 2007. 285?290. [doi: 10.1109/SNPD.2007.166]
    [72] Yap WS, Heng SH, Goi BM. Cryptanalysis of some proxy signature schemes without certificates. In: Sauveron D, et al., eds. Proc. of the WISTP 2007. LNCS 4462, Heidelberg: Springer-Verlag, 2007. 115?126. [doi: 10.1007/978-3-540-72354-7_10]
    [73] Nong Q, Hao YH. Cryptanalysis and improvements of two certificateless signature schemes with additional properties. In: Li Y, ed. Proc. of the 2008 Int’l Symp. on Computer Science and Computational Technology (ISCSCT 2008). Shanghai: IEEE Computer Society, 2008. 54?58. [doi: 10.1109/ISCSCT.2008.46]
    [74] Chen H, Zhang FT, Song RS. Certificateless proxy signature scheme with provable security. Journal of Software, 2009,20(3): 692?701 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/20/692.htm [doi: 10.3724/SP.J.1001.2009.00574]
    [75] Duan S. Certificateless undeniable signature scheme. Information Sciences, 2008,178(3):742?755. [doi: 10.1016/j.ins.2007.08.009]
    [76] Mandt TK, Tan CH. Certificateless authenticated two-party key agreement protocols. In: Okada M, Satoh I, eds. Proc. of the ASIAN 2006. LNCS 4435, Heidelberg: Springer-Verlag, 2008. 37?44. [doi: 10.1007/978-3-540-77505-8_4]
    [77] Xia L, Wang SB, Shen JJ, Xu GM. Breaking and repairing the certificateless key agreement protocol from ASIAN 2006. Wuhan University Journal of Natural Sciences, 2008,13(5):562?566.
    [78] Gao M, Zhang FT. Key-Compromise impersonation attacks on some certificateless key agreement protocols and two improved protocols. In: Hu Z, ed. Proc. of the 2009 Int’l Workshop on Education Technology and Computer Science (ETCS 2009). Wuhan: IEEE Computer Society, 2009. 62?66. [doi: 10.1109/ETCS.2009.276]
    [79] Catalano D, Fiore D, Gennaro R. Certificateless onion routing. In: Gunter C, Ning P, et al., eds. Proc. of the CCS 2009. New York: ACM Press, 2009. 1?10. [doi: 10.1145/1653662.1653682]
    [80] Wang FJ, Zhang YQ. A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography. Computer Communications, 2008,31(10):2142?2149. [doi: 10.1016/j.comcom.2008.01.054]
    [81] Gao M. Research on certificateless two party and tripartite key agreement protocols [MS. Thesis]. Nanjing: Nanjing Normal University, 2009 (in Chinese with English abstract).
    [82] Wang SB, Cao ZF, Dong X. Certificateless authenticated key agreement based on the MTI/CO protocol. Journal of Information and Computational Science, 2006,3(3):575?581.
    [83] Wang SB, Cao ZF, Wang LC. Efficient certificateless authenticated key agreement protocol from pairings. Wuhan University Journal of Natural Sciences, 2006,11(5):1278?1282. [doi: 10.1007/BF02829251]
    [84] Shi YJ, Li JH. Two-Party authenticated key agreement in certificateless public key cryptography. Wuhan University Journal of Natural Sciences, 2007,12(1):71?74. [doi: 10.1007/s11859-006-0194-y]
    [85] Wang SB, Cao ZF, Bao HY. Efficient certificateless authentication and key agreement (CL-AK) for grid computing. Int’l Journal of Network Security, 2008,7(3):342?347.
    [86] Swanson CM. Security in key agreement: Two-Party certificateless schemes [MS. Thesis]. University of Waterloo, 2008.
    [87] Lippold G, Boyd C, Gonzalez NJM. Strongly secure certificateless key agreement. In: Shacham H, Waters B, eds. Proc. of the Pairing-Based Cryptography—Pairing 2009. LNCS 5671, Heidelberg: Springer-Verlag, 2009. 206?230. [doi: 10.1007/978-3-642-03298-1_14]
    [88] Swanson C, Jao D. A study of two-party certificateless authenticated key-agreement protocols. In: Roy B, Sendrier N, eds. Proc. of the INDOCRYPT 2009. LNCS 5922, New Delhi, Heidelberg: Springer-Verlag, 2009. 57?71. [doi: 10.1007/978-3-642-10628-6_4]
    [89] Hou M, Xu QL. Constructing secure two-party authenticated key agreement protocol based on certificateless public key encryption scheme. In: Yuan K, et al., eds. Proc. of the 4th Int’l Conf. on Computer Science & Education (ICCSE 2009). Nanning: IEEE Computer Society, 2009.1923?1927. [doi: 10.1109/ICCSE.2009.5228215]
    [90] Hou MB, Xu QL. On the security of certificateless authenticated key agreement protocol. In: Jin H, et al., eds. Proc. of the 4th ChinaGrid Annual Conf. (ChinaGrid 2009). Yantai: IEEE Computer Society, 2009. 974?979.
    [91] Hou MB, Xu QL. Key replicating attack on certificateless authenticated key agreement protocol. In: Luo Q, ed. Proc. of the 2009 Asia- Pacific Conf. on Information Processing (APCIP 2009). Shenzhen: IEEE Computer Society, 2009. 574?577. [doi: 10.1109/APCIP. 2009.277]
    [92] Hou MB, Xu QL. Two-Party authenticated key agreement protocol from certificateless public key encryption scheme. In: Chung J, et al., eds. Proc. of the 2009 Int’l Conf. on Management of e-Commerce and e-Government (ICMeCG). Nanchang: IEEE Computer Society, 2009. 440?444. [doi: 10.1109/ICMeCG.2009.12]
    [93] Gao M, Zhang F. An efficient certificateless authenticated tripartite key agreement protocol. In: Wang P, et al., eds. Proc. of the Information Systems and Management (ISM 2009). Beijing: IEEE Computer Society, 2009. 1?4.
    [94] Cao CJ, Ma JF, Moon S. Provable efficient certificateless group key exchange protocol. Wuhan University Journal of Natural Sciences, 2007,12(1):41?45.
    [95] Heo S, Kim Z, Kim K. Certificateless authenticated group key agreement protocol for dynamic groups. In: Shen X, et al., eds. Proc. of the Global Telecommunications Conf. (GLOBECOM 2007). Washington: IEEE Computer Society, 2007. 464?468. [doi: 10.1109/GLOCOM.2007.93]
    [96] Lee EJ, Lee SE, Yoo K. A certificateless authenticated group key agreement protocol providing forward secrecy. In: Park M, et al., eds. Proc. of the IEEE Symp. on Ubiquitous Multimedia Computing (UMC 2008). Hobart: IEEE Computer Society, 2008. 124?129. [doi: 10.1109/UMC.2008.32]
    [97] Geng MM, Zhang FT, Gao M. An improved secure certificateless authenticated group key agreement protocol. In: Trajkovic L, Fraser S, eds. Proc. of the 2009 IEEE Int’l Conf. on Intelligent Computing and Intelligent Systems (ICIS 2009), Vol.3. Shanghai: IEEE Computer Society, 2009. 337?341.
    [98] Geng M, Zhang F, Gao M. A secure certificateless authenticated group key agreement protocol. In: Wang L, et al., eds. Proc. of the 2009 Int’l Conf. on Multimedia Information Networking and Security (MINES 2009), Wuhan: IEEE Computer Society, 2009. 342?346. [doi: 10.1109/MINES.2009.35]
    [99] Barbosa M, Farshim P. Certificateless signcryption. In: Abe M, Gligor V, eds. Proc. of the 2008 ACM Symp. on Information, Computer and Communications Security. New York, 2008. 369?372. [doi: 10.1145/1368310.1368364]
    [100] Aranha D, Castro R, Lopez J, Dahab R. Efficient certificateless signcryption. 2008. 257?258. http://sbseg2008.inf.Ufrgs.br/proceedings/data/pdf/st03-01-resumo.pdf
    [101] Wu CH, Chen ZX. A new efficient certificateless signcryption scheme. In: Yu F, Yue G, eds. Proc. of the 2008 Int’l Symp. on Information Science and Engieering (ISISE 2008), Vol.1. Shanghai: IEEE Computer Society, 2008. 661?664. [doi: 10.1109/ISISE.2008.206]
    [102] Selvi SSD, Vivek SS, Rangan CP. Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing. In: Bao F, et al., eds. Proc. of the Inscrypt 2009. LNCS 6151, 2010. 75?92. [doi: 10.1007/978-3-642-16342-5_6]
    [103] Barreto PSLM, Deusajute AM, Cruz ES, Pereira GC, Silva RR. Toward efficient certificateless signcryption from (and without) bilinear pairings. In: Gaspary LP, et al., eds. Proc. of the 2008 SBSeg Technical Session 3. Gramado, 2008. 115?125.
    [104] Li FG, Shirase M, Takagi T. Certificateless hybrid signcryption. In: Bao F, Li H, Wang G, eds. Proc. of the 2009 Information Security Practice and Experience. LNCS 5451, Heidelberg: Springer-Verlag, 2009. 112?123. [doi: 10.1007/978-3-642-00843-6_11]
    [105] Selvi SSD, Vivek SS, Rangan CP. Certificateless KEM and hybrid signcryption schemes revisited. In: Kwak J, et al., eds. Proc. of the ISPEC 2010. LNCS 6047, 2010. 294?307. [doi: 10.1007/978-3-642-12827-1_22]
    [106] Xie W, Zhang Z. Efficient and provably secure certificateless signcryption from bilinear maps. Report 2010/578, Cryptology ePrint Archive, 2009. http://eprint.iacr.org/2010/578
    [107] Liu ZH, Hu YP, Zhang XS, Ma H. Certificateless signcryption scheme in the standard model. Information Sciences, 2010,180(3): 452?464. [doi: 10.1016/j.ins.2009.10.011]
    [108] Weng J, Yao GX, Deng RH, Chen MR, Li XX. Cryptanalysis of a certificateless signcryption scheme in the standard model. Information Sciences, 2011,181(3):661?667. [doi: 10.1016/j.ins.2010.09.037]
    [109] Selvi SSD, Vivek SS, Shukla D, Chandrasekaran PR. Efficient and provably secure certificateless multi-receiver signcryption. In: Baek J, et al., eds. Proc. of the ProvSec 2008. LNCS 5324, Heidelberg: Springer-Verlag, 2008. 52?67. [doi: 10.1007/978-3-540-88733-1_4]
    [110] Selvi SSD, Vivek SS, Rangan C. A note on the certificateless multi-receiver signcryption scheme. Report 2009/308, Cryptology ePrint Archive, 2009. http://eprint.iacr.org/2009/308.pdf
    [111] Miao SQ, Zhang FT, Zhang L. Cryptanalysis of a certificateless multi-receiver signcryption scheme. In: Furht B, et al., eds. Proc. of the 2010 Int’l Conf. on Multimedia Information Networking and Security. 2010. 593?597. [doi: 10.1109/MINES.2010. 130]
    [112] Long Y, Chen KF. Certificateless threshold cryptosystem secure against chosen-ciphertext attack. Information Sciences, 2007, 177(24):5620?5637. [doi: 10.1016/j.ins.2007.06.014]
    [113] Zhang GY. Certificateless threshold decryption scheme secure in the standard model. In: Zeng L, et al., eds. Proc. of the 2nd IEEE Int’l Conf. on Computer Science and Information Technology (ICCSIT 2009). Beijing: IEEE Computer Society, 2009. 414?418. [doi: 10.1109/ICCSIT.2009.5234812]
    [114] Yang PY, Cao ZF, Dong XL. Chosen ciphertext secure certificateless threshold encryption in the standard model. In: Yung M, Liu P, Lin D, eds. Proc. of the Inscrypt 2008. LNCS 5487, Beijing, Heidelberg: Springer-Verlag, 2009. 201?216. [doi: 10.1007/978 -3-642-01440-6_17]
    [115] Long Y, Chen KF. Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism. Information Sciences, 2010,180(7):1167?1181. [doi: 10.1016/j.ins.2009.12.008]
    [116] Wang LC, Cao ZF, Li XX, Qian HF. Simulatability and security of certificateless threshold signatures. Information Science, 2007,177(6): 1382?1394. [doi: 10.1016/j.ins.2006.08.008]
    [117] Yuan H, Zhang FT, Huang XY, Mu Y, Susilo W, Zhang L. Certificateless threshold signature scheme from bilinear maps. Information Sciences, 2010,180(23):4714?4728. [doi: 10.1016/j.ins.2010.07.021]
    [118] Xiong H, Qin ZG, Li FG. Simulatability and security of certificateless threshold signatures without random oracles. In: Zhao H, Deb K, Wang Y, eds. Proc. of the 2008 Int’l Conf. on Computational Intelligence and Security (CIS 2008). Suzhou: IEEE Computer Society, 2008. 308?313. [doi: 10.1109/CIS.2008.104]
    [119] Xiong H, Li FG, Qin ZG. Certificateless threshold signature secure in thestandard model. Information Sciences, 2010,180(6):1016. [doi: 10.1016/j.ins. 2010.06.010]
    [120] Chang S, Wong DS, Mu Y, Zhang ZF. Certificateless threshold ring signature. Information Sciences, 2009,179(20):3685?3696.
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

张福泰,孙银霞,张磊,耿曼曼,李素娟.无证书公钥密码体制研究.软件学报,2011,22(6):1316-1332

复制
分享
文章指标
  • 点击次数:11787
  • 下载次数: 19455
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2010-05-20
  • 最后修改日期:2011-02-15
文章二维码
您是第20260096位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号