Sciweavers

AFRICACRYPT
2009
Springer

Certified Encryption Revisited

13 years 8 months ago
Certified Encryption Revisited
The notion of certified encryption had recently been suggested as a suitable setting for analyzing the security of encryption against adversaries that tamper with the key-registration process. The flexible syntax afforded by certified encryption suggests that identity-based and certificateless encryption schemes can be analyzed using the models for certified encryption. In this paper we explore the relationships between security models for these two primitives and that for certified encryption. We obtain the following results. We show that an identity-based encryption scheme is secure if and only if it is secure when viewed as a certified encryption scheme. This result holds under the (unavoidable) restriction that registration occurs over private channels. In the case of certificateless encryption we observe that a similar result cannot hold. The reason is that existent models explicitly account for attacks against the non-monolithic structure of the secret keys whereas certified encr...
Pooya Farshim, Bogdan Warinschi
Added 12 Aug 2010
Updated 12 Aug 2010
Type Conference
Year 2009
Where AFRICACRYPT
Authors Pooya Farshim, Bogdan Warinschi
Comments (0)