Please use this identifier to cite or link to this item: https://doi.org/10.1016/j.tcs.2011.06.015
DC FieldValue
dc.titleCertificateless cryptography with KGC trust level 3
dc.contributor.authorYang, G.
dc.contributor.authorTan, C.H.
dc.date.accessioned2014-11-28T01:51:05Z
dc.date.available2014-11-28T01:51:05Z
dc.date.issued2011-09-09
dc.identifier.citationYang, G., Tan, C.H. (2011-09-09). Certificateless cryptography with KGC trust level 3. Theoretical Computer Science 412 (39) : 5446-5457. ScholarBank@NUS Repository. https://doi.org/10.1016/j.tcs.2011.06.015
dc.identifier.issn03043975
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/111339
dc.description.abstractA normal certificateless cryptosystem can only achieve KGC trust level 2 according to the trust hierarchy defined by Girault. Although in the seminal paper introducing certificateless cryptography, Al-Riyami and Paterson introduced a binding technique to lift the KGC trust level of their certificateless schemes to level 3, many subsequent work on certificateless cryptography just focused on the constructions of normal certificateless schemes, and a formal study on the general applicability of the binding technique to these existing schemes is still missing. In this paper, to address the KGC trust level issue, we introduce the notion of Key Dependent Certificateless Cryptography (KD-CLC). Compared with conventional certificateless cryptography, KD-CLC can achieve stronger security, and more importantly, KGC trust level 3. We then study generic techniques for transforming conventional CLC to KD-CLC. We start with the binding technique by Al-Riyami and Paterson, and show that there are some technical difficulties in proving that the binding technique is generally applicable. However, we show that a slightly modified version of the binding technique indeed can be proved to work under the random oracle assumption. Finally, we show how to perform the transformation using a standard cryptographic primitive instead of a random oracle. © 2011 Elsevier B.V. All rights reserved.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1016/j.tcs.2011.06.015
dc.sourceScopus
dc.subjectCertificateless cryptography
dc.subjectDigital signature
dc.subjectPublic key encryption
dc.subjectTrust hierarchy
dc.typeArticle
dc.contributor.departmentTEMASEK LABORATORIES
dc.description.doi10.1016/j.tcs.2011.06.015
dc.description.sourcetitleTheoretical Computer Science
dc.description.volume412
dc.description.issue39
dc.description.page5446-5457
dc.description.codenTCSCD
dc.identifier.isiut000294592500028
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

SCOPUSTM   
Citations

7
checked on Feb 19, 2021

WEB OF SCIENCETM
Citations

6
checked on Feb 19, 2021

Page view(s)

75
checked on Feb 13, 2021

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.