원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.10 No.7
2016.07
pp.103-118
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
Certificateless Public Key Cryptography is a scheme that provides security by avoiding the key escrow and eliminating the drawback of identity-based cryptography. Several certificateless models have been proposed to enhance the efficiency and overcome adversaries attacks. In this paper, we survey various public key encryption schemes on certificateless setting with the security model and discuss the performance. Also, we present the generic model of Certificateless Public Key Encryption (CL-PKE) scheme proposed by various authors.
목차
Abstract
1. Introduction
1.1. Identity-Based Cryptography
1.2. Certificateless Cryptography
2. Preliminaries
3. Security Models of Certificateless Cryptography
3.1. Adversary Types
3.2. Type I and Type II Attack Variations
3.3. Adversary Power and Goals
3.4. Adversaries and Oracles
4. Survey of Proposed Protocols
4.1. Al-Riyami 1/Yum-Lee version CL-PKE [9]
4.2. Al-Riyami 2 CL-PKE
4.3. Al-Riyami 3 CL-PKE
4.4 Al-Riyami-Paterson 1 CL-PKE [5]
4. Conclusion
Acknowledgements
References
1. Introduction
1.1. Identity-Based Cryptography
1.2. Certificateless Cryptography
2. Preliminaries
3. Security Models of Certificateless Cryptography
3.1. Adversary Types
3.2. Type I and Type II Attack Variations
3.3. Adversary Power and Goals
3.4. Adversaries and Oracles
4. Survey of Proposed Protocols
4.1. Al-Riyami 1/Yum-Lee version CL-PKE [9]
4.2. Al-Riyami 2 CL-PKE
4.3. Al-Riyami 3 CL-PKE
4.4 Al-Riyami-Paterson 1 CL-PKE [5]
4. Conclusion
Acknowledgements
References
저자정보
참고문헌
자료제공 : 네이버학술정보
