Pairing-based cryptosystems and key agreement protocols.

Doctoral thesis English OPEN
Cheng, Zhaohui

For a long time, pairings on elliptic curves have been considered to be destructive in elliptic curve cryptography. Only recently after some pioneering works, particularly the well-known Boneh-Franklin identity-based encryption (IBE), pairings have quickly become an important\ud tool to construct novel cryptographic schemes.\ud In this thesis, several new cryptographic schemes with pairings are proposed, which are both efficient and secure with respect to a properly defined security model, and some\ud relevant previous schemes are revisited.\ud IBE provides a public key encryption mechanism where a public key can be an arbitrary string such as an entity identifier and unwieldy certificates are unnecessary. Based on the Sakai-Kasahara key construction, an IBE scheme which is secure in the Boneh-Franklin IBE model is constructed, and two identity-based key encapsulation mechanisms are proposed. These schemes achieve the best efficiency among the existing schemes to date. Recently Al-Riyami and Paterson introduced the certificateless public key encryption (CL-PKE) paradigm, which eliminates the need of certificates and at the same time retains the desirable properties of IBE without the key escrow problem. The security formulation of CL-PKE is revisited and a strong security model for this type of mechanism is defined.\ud Following a heuristic approach, three efficient CL-PKE schemes which are secure in the defined strong security model are proposed. Identity-based two-party key agreement protocols from pairings are also investigated.\ud The Bellare-Rogaway key agreement model is enhanced and within the model several previously unproven protocols in the literature are formally analysed. In considering that the user identity may be sensitive information in many environments, an identity-based key agreement protocol with unilateral identity privacy is proposed.
  • References (42)
    42 references, page 1 of 5

    5 Identity-Based Key Agreement Protocols 5.1 Introduction . 5.2 Two-Party Key Agreement Security Model 5.3 Review on Existing Schemes from Pairing . 5.4 Security Analysis of the SCK and SYL Protocol. 5.4.1 Security Analysis of the SCK Protocol 5.4.2 Security Analysis of the SYL Protocol 5.4.3 The Built-in Decisional Function . 5.4.4 Group Membership Testing . 5.5 Security Analysis of the McCallugh-Barreto Protocol . 5.5.1 The MB Protocol and its Variants . 5.5.2 On the Existing Security Proofs . 5.5.3 A Modified Scheme and its Security Analysis . 5.6 An Identity-Based KAP with Unilateral Identity Privacy. 5.6.1 Description of the Scheme . 5.6.2 Security Model of KAP with Identity Privacy 5.6.3 Security Analysis of the Scheme . . . 5.6.4 Efficiency Discussion and Comparison . . . .

    [1] M. Abadi. Private authentication. In Proc. of Privacy Enhancing Technologies 2002, LNCS 2482, pp. 27-40, 2002.

    [3] M. H. Au, J. Chen, J. K. Liu, Y. Mu, D. S. Wong and G. Yang. Malicious KGC attack in certificateless cryptography. Cryptology ePrint Archive, Report 2006/255, 2006.

    [4] N. Attrapadung, B. Chevallier-Mames, J. Furukawa, T. Gomi, G. Hanaoka, H. Imai and R. Zhang. Efficient identity-based encryption with tight security reduction. In Proc. of CANS06, LNCS 4301, pp. 19-36, 2005. Also available on Cryptology ePrint Archive, Report 2005/320, 2005.

    [5] S. S. Al-Riyami and K. G. Paterson. Certificateless public key cryptography. In Pmc. of Advances in Cryptology - Asiacrypt 2003, LNCS 2894, pp. 452-473, 2003.

    [6] S. S. Al-Riyami and K. G. Paterson. CBE from CL-PKE: a generic construction and efficient schemes. In Proc. of Public Key Cryptography - PKC 2005, LNCS 3386, pp. 398-415, 2005.

    [7] M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). J. Cryptology 15(2):103-127, 2002.

    [8] M. Burrows, M. Abadi and R. Needham. A logic for authentication. DEC Systems Research Center Technical Report 39, 1990.

    [11] D. Boneh and X. Boyen. Short signatures without random oracles. In Proc. of Advances in Cryptology - Eurocrypt 2004, LNCS 3027, pp. 56-73, 2004.

    [12] D. Boneh and X. Boyen. Secure identity-based encryption without random oracles. In Proc. of Advances in Cryptology - Crypto 2004, LNCS 3152, pp. 443-459, 2004.

  • Metrics
    views in OpenAIRE
    views in local repository
    downloads in local repository

    The information is available from the following content providers:

    From Number Of Views Number Of Downloads
    Middlesex University Research Repository - IRUS-UK 0 40
Share - Bookmark