Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Stateful Certificateless Public Key Encryption with Application in Public Cloud

  • Conference paper
  • First Online:
Innovative Security Solutions for Information Technology and Communications (SECITC 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9522))

Included in the following conference series:

  • 1309 Accesses

Abstract

Certificateless cryptography eliminates the key escrow problem inherent in identity based cryptosystem. Certificatateless systems are preferred in public cloud to offer security because it solves two different problems simultaneously, namely, the key escrow problem and the cumbersome certificate management. A stateful public key encryption scheme is a cryptographic primitive, in which the sender maintains state information to perform encryption. The encryption algorithm takes the intended message, receiver’s public key and the current state information to produce the ciphertext, and possibly updates the state information. Decryption is straightforward and depends only on the ciphertext and secret key of the receiver. In this paper, we propose the first stateful certificateless public key encryption scheme and prove the security of the scheme in the random oracle model. This scheme finds very interesting application for sharing data in an encrypted cloud storage system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Abe, M., Kiltz, E., Okamoto, T.: Compact CCA-secure encryption for messages of arbitrary length. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 377–392. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  2. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Baek, J., Chu, C.-K., Zhou, J.: On shortening ciphertexts: new constructions for compact public key and stateful encryption schemes. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 302–318. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  4. Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 134–148. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Bellare, M., Kohno, T., Shoup, V.: Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation. In: ACM Conference on Computer and Communications Security - ACM-CCS 2006, pp. 380–389. ACM (2006)

    Google Scholar 

  6. Bendel, M.: Hackers describe ps3 security as epic fail, gain unrestricted access (2010). http://www.exophase.com/20540/hackers-describe-ps3-security-as-epic-fail-gain-unrestricted-access/

  7. Castro, R., Dahab, R.: Two notes on the security of certificateless signatures. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 85–102. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  8. Cheng, Z., Comley, R.: Efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/012 (2005). http://eprint.iacr.org/

  9. Dent, A.W.: A survey of certificateless encryption schemes and security models. Int. J. Inf. Secur. 7(5), 349–377 (2008)

    Article  Google Scholar 

  10. Huang, X., Susilo, W., Mu, Y., Zhang, F.T.: On the security of certificateless signature schemes from Asiacrypt 2003. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 13–25. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Lai, J., Deng, R.H., Liu, S., Kou, W.: RSA-Based Certificateless Public Key Encryption. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 24–34. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  12. Lenstra, A.K., Hughes, J.P., Augier, M., Bos, J.W., Kleinjung, T., Wachter, C. : Ron was wrong, whit is right. IACR Cryptology ePrint Archive (2012)

    Google Scholar 

  13. Liu, J.K., Au, M.H., Susilo, W.: Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model: extended abstract. In: Proceedings of the ACM Symposium on Information, Computer and Communications Security - ASIA-CCS 2007, pp. 273–283. ACM (2007)

    Google Scholar 

  14. Okamoto, T., Pointcheval, D.: The gap-problems: a new class of problems for the security of cryptographic schemes. In: Kim, K. (ed.) PKC 2001. LNCS, vol. 1992, pp. 104–118. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  15. Park, J.-H., Choi, K.Y., Hwang, J.Y., Lee, D.-H.: Certificateless public key encryption in the selective-ID security model (without random oracles). In: Takagi, T., Okamoto, E., Okamoto, T., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 60–82. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  16. Phong, L.T., Matsuoka, H., Ogata, W.: Stateful identity-based encryption scheme: faster encryption and decryption. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security - ASIACCS 2008, pp. 381–388. ACM (2008)

    Google Scholar 

  17. Shi, Y., Li, J.: Provable efficient certificateless public key encryption. Cryptology ePrint Archive, Report 2005/287 (2005). http://eprint.iacr.org/

  18. Sun, Y., Zhang, F.T., Baek, J.: Strongly secure certificateless public key encryption without pairing. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol. 4856, pp. 194–208. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  19. Sree Vivek, S., Selvi, S., Rangan, C.P.: CCA secure certificateless encryption schemes based on RSA. In: SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, pp. 208–217. SciTePress (2011)

    Google Scholar 

  20. Vivek, S.S., Selvi, S.S.D., Rangan, C.P.: Compact stateful encryption schemes with ciphertext verifiability. In: Hanaoka, G., Yamauchi, T. (eds.) IWSEC 2012. LNCS, vol. 7631, pp. 87–104. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Sree Vivek .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Sree Vivek, S. (2015). Stateful Certificateless Public Key Encryption with Application in Public Cloud. In: Bica, I., Naccache, D., Simion, E. (eds) Innovative Security Solutions for Information Technology and Communications. SECITC 2015. Lecture Notes in Computer Science(), vol 9522. Springer, Cham. https://doi.org/10.1007/978-3-319-27179-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27179-8_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27178-1

  • Online ISBN: 978-3-319-27179-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics