Efficient certificateless KEM in the standard model
Contribuinte(s) |
Hong, Seokhie Lee, Donghoon |
---|---|
Data(s) |
2010
|
Resumo |
We give a direct construction of a certificateless key encapsulation mechanism (KEM) in the standard model that is more efficient than the generic constructions proposed before by Huang and Wong \cite{DBLP:conf/acisp/HuangW07}. We use a direct construction from Kiltz and Galindo's KEM scheme \cite{DBLP:conf/acisp/KiltzG06} to obtain a certificateless KEM in the standard model; our construction is roughly twice as efficient as the generic construction. We also address the security flaw discovered by Selvi et al. \cite{cryptoeprint:2009:462}. |
Formato |
application/pdf |
Identificador | |
Publicador |
Springer Berlin / Heidelberg |
Relação |
http://eprints.qut.edu.au/34215/1/c34215.pdf DOI:10.1007/978-3-642-14423-3_3 Lippold, Georg, Boyd, Colin, & Gonzalez Nieto, Juan M. (2010) Efficient certificateless KEM in the standard model. In Hong, Seokhie & Lee, Donghoon (Eds.) Lecture Notes in Computer Science : Information, Security and Cryptology (ICISC 2009), Springer Berlin / Heidelberg, Korea University, Seoul, pp. 34-46. |
Direitos |
Copyright 2010 Springer-Verlag Berlin Heidelberg This is the author-version of the work. Conference proceedings published by Springer Verlag will be available via SpringerLink. http://www.springer.de/comp/lncs/ |
Fonte |
Computer Science; Faculty of Science and Technology; Information Security Institute |
Palavras-Chave | #080402 Data Encryption #key encapsulation mechanism #certificateless #efficient #standard model |
Tipo |
Conference Paper |