Efficient certificateless KEM in the standard model


Autoria(s): Lippold, Georg; Boyd, Colin; Gonzalez Nieto, Juan M.
Contribuinte(s)

Hong, Seokhie

Lee, Donghoon

Data(s)

2010

Resumo

We give a direct construction of a certificateless key encapsulation mechanism (KEM) in the standard model that is more efficient than the generic constructions proposed before by Huang and Wong \cite{DBLP:conf/acisp/HuangW07}. We use a direct construction from Kiltz and Galindo's KEM scheme \cite{DBLP:conf/acisp/KiltzG06} to obtain a certificateless KEM in the standard model; our construction is roughly twice as efficient as the generic construction. We also address the security flaw discovered by Selvi et al. \cite{cryptoeprint:2009:462}.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/34215/

Publicador

Springer Berlin / Heidelberg

Relação

http://eprints.qut.edu.au/34215/1/c34215.pdf

DOI:10.1007/978-3-642-14423-3_3

Lippold, Georg, Boyd, Colin, & Gonzalez Nieto, Juan M. (2010) Efficient certificateless KEM in the standard model. In Hong, Seokhie & Lee, Donghoon (Eds.) Lecture Notes in Computer Science : Information, Security and Cryptology (ICISC 2009), Springer Berlin / Heidelberg, Korea University, Seoul, pp. 34-46.

Direitos

Copyright 2010 Springer-Verlag Berlin Heidelberg

This is the author-version of the work. Conference proceedings published by Springer Verlag will be available via SpringerLink. http://www.springer.de/comp/lncs/

Fonte

Computer Science; Faculty of Science and Technology; Information Security Institute

Palavras-Chave #080402 Data Encryption #key encapsulation mechanism #certificateless #efficient #standard model
Tipo

Conference Paper