Encryption schemes and key exchange protocols in the certificateless setting


Autoria(s): Lippold, Georg
Data(s)

2010

Resumo

The contributions of this thesis fall into three areas of certificateless cryptography. The first area is encryption, where we propose new constructions for both identity-based and certificateless cryptography. We construct an n-out-of- n group encryption scheme for identity-based cryptography that does not require any special means to generate the keys of the trusted authorities that are participating. We also introduce a new security definition for chosen ciphertext secure multi-key encryption. We prove that our construction is secure as long as at least one authority is uncompromised, and show that the existing constructions for chosen ciphertext security from identity-based encryption also hold in the group encryption case. We then consider certificateless encryption as the special case of 2-out-of-2 group encryption and give constructions for highly efficient certificateless schemes in the standard model. Among these is the first construction of a lattice-based certificateless encryption scheme. Our next contribution is a highly efficient certificateless key encapsulation mechanism (KEM), that we prove secure in the standard model. We introduce a new way of proving the security of certificateless schemes based that are based on identity-based schemes. We leave the identity-based part of the proof intact, and just extend it to cover the part that is introduced by the certificateless scheme. We show that our construction is more efficient than any instanciation of generic constructions for certificateless key encapsulation in the standard model. The third area where the thesis contributes to the advancement of certificateless cryptography is key agreement. Swanson showed that many certificateless key agreement schemes are insecure if considered in a reasonable security model. We propose the first provably secure certificateless key agreement schemes in the strongest model for certificateless key agreement. We extend Swanson's definition for certificateless key agreement and give more power to the adversary. Our new schemes are secure as long as each party has at least one uncompromised secret. Our first construction is in the random oracle model and gives the adversary slightly more capabilities than our second construction in the standard model. Interestingly, our standard model construction is as efficient as the random oracle model construction.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/41697/

Publicador

Queensland University of Technology

Relação

http://eprints.qut.edu.au/41697/1/Georg_Lippold_Thesis.pdf

Lippold, Georg (2010) Encryption schemes and key exchange protocols in the certificateless setting. PhD thesis, Queensland University of Technology.

Fonte

Faculty of Science and Technology; Information Security Institute

Palavras-Chave #certificateless encryption, certificateless key encapsulation, certificateless key agreement, security models, IND-CPA, IND-CCA2, generic conversion, ID-based, standard model #random oracle model, bilinear pairings, lattices, trapdoor algorithms
Tipo

Thesis