Font Size: a A A

Research On Certificateless Public Key Cryptography Based On ECC

Posted on:2012-01-17Degree:DoctorType:Dissertation
Country:ChinaCandidate:R ZhangFull Text:PDF
GTID:1118330344952181Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Public key cryptography enables users who do not share any secret key to securely communicate over a public channel. This idea was first introduced in 1976 by Diffie and Hellman in their seminal paper. Since then many new cryptosystems have been proposed, such as the traditional public key infrastructure, Identity-Based Public Key Cryptography (IBC), Self-Certificated Public Key Cryptography (SCPKC), Certificateless Public Key Cryptography (CLPKC) and so on.In contrast to traditional public key cryptographic systems, CLPKC does not require the use of certificates to guarantee the authenticity of public keys. It does rely on the use of a trusted third party (TTP) who is in possession of a master key. In these respects, CLPKC is similar to identity-based public key cryptography (IBC). On the other hand, CLPKC does not suffer from the key escrow property that seems to be inherent in IBC. Thus CL-PKC can be seen as a model for the use of public key cryptography that is intermediate between traditional certificated PKC and IBC.Since Al-Riyami and Paterson introduced the certificateless public key cryptography, many certificateless primitives using bilinear pairings have been proposed. But the relative computation cost of the pairing is approximately twenty times higher than that of the scalar multiplication over elliptic curve group. In order to improve the performance We make concrete the concept and the security model of CLPKC based on Elliptic Curve Cryptography which without bilinear pairings, and we design the schemes for certificateless public key encryption (CLPKE), signature (CLPKS), Two-Party Authenticated Key Agreement Protocol (CTAKA) and Proxy signature (CLPKPS), which are all derived form the scalar multiplication over elliptic curve group. With the running time being saved greatly, our schemes is more practical than the previous schemes for practical application.
Keywords/Search Tags:Elliptic Curve Cryptography, Public Key Cryptography, Certificateless Public Key Cryptography, Random Oracle, Provable Security
PDF Full Text Request
Related items