Certificateless key agreement in the standard model


Autoria(s): Lippold, Georg; Gonzalez Nieto, Juan Manuel
Contribuinte(s)

Boyd, Colin

Susilo, Willy

Data(s)

2010

Resumo

We show how to construct a certificateless key agreement protocol from the certificateless key encapsulation mechanism introduced by \cite{lippold-ICISC_2009} in ICISC 2009 using the \cite{DBLP:conf/acisp/BoydCNP08} protocol from ACISP 2008. We introduce the Canetti-Krawczyk (CK) model for certificateless cryptography, give security notions for Type I and Type II adversaries in the CK model, and highlight the differences to the existing e$^2$CK model discussed by \cite{DBLP:conf/pairing/LippoldBN09}. The resulting CK model is more relaxed thus giving more power to the adversary than the original CK model.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/34218/

Publicador

ACS

Relação

http://eprints.qut.edu.au/34218/1/c34218.pdf

http://crpit.com/confpapers/CRPITV105Lippold.pdf

Lippold, Georg & Gonzalez Nieto, Juan Manuel (2010) Certificateless key agreement in the standard model. In Boyd, Colin & Susilo, Willy (Eds.) Proceedings of the 8th Australasian Information Security Conference (AISC 2010), ACS, Queensland University of Technology, Brisbane, Queensland, pp. 75-85.

Direitos

Copyright 2010 Please consult the authors.

Fonte

Computer Science; Faculty of Science and Technology; Information Security Institute

Palavras-Chave #080402 Data Encryption #key agreement #certificateless #standard model #key encapsulation mechanism #Diffie-Hellman
Tipo

Conference Paper