Certificateless key agreement in the standard model
Contribuinte(s) |
Boyd, Colin Susilo, Willy |
---|---|
Data(s) |
2010
|
Resumo |
We show how to construct a certificateless key agreement protocol from the certificateless key encapsulation mechanism introduced by \cite{lippold-ICISC_2009} in ICISC 2009 using the \cite{DBLP:conf/acisp/BoydCNP08} protocol from ACISP 2008. We introduce the Canetti-Krawczyk (CK) model for certificateless cryptography, give security notions for Type I and Type II adversaries in the CK model, and highlight the differences to the existing e$^2$CK model discussed by \cite{DBLP:conf/pairing/LippoldBN09}. The resulting CK model is more relaxed thus giving more power to the adversary than the original CK model. |
Formato |
application/pdf |
Identificador | |
Publicador |
ACS |
Relação |
http://eprints.qut.edu.au/34218/1/c34218.pdf http://crpit.com/confpapers/CRPITV105Lippold.pdf Lippold, Georg & Gonzalez Nieto, Juan Manuel (2010) Certificateless key agreement in the standard model. In Boyd, Colin & Susilo, Willy (Eds.) Proceedings of the 8th Australasian Information Security Conference (AISC 2010), ACS, Queensland University of Technology, Brisbane, Queensland, pp. 75-85. |
Direitos |
Copyright 2010 Please consult the authors. |
Fonte |
Computer Science; Faculty of Science and Technology; Information Security Institute |
Palavras-Chave | #080402 Data Encryption #key agreement #certificateless #standard model #key encapsulation mechanism #Diffie-Hellman |
Tipo |
Conference Paper |