An Efficient Certificateless Cryptography Scheme … Efficient Certificateless Cryptography Scheme...

1
An Efficient Certificateless Cryptography Scheme without Pairing Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino Purdue University 1. Certificateless Public Key Cryptography 2. Mediated CL-PKE without pairing 3. Experimental Results Encryption and decryption times of the mCL-PKE for different message size 4. Discussions and Future Work Performance comparison with a recent pairing based scheme The experimental environment CPU Memory OS Program Lang. Library Intel Core TM i5- 2430 CPU @ 2.40GHZ 8 GBytes memory 32 bits GNU Linux kernel C/C++ NTL library version 5.5.2 Secure data sharing for public cloud computing services Encrypted Storage SEM KGC User Data Owner Encrypt data encryption key using mCL-PKE, Encrypt data using symmetric enc. Algo.. Public Cloud (3) Get users’ KGC-keys (4) Encryption (2) SEM-keys (1) PK (2) U-key (6) SEM Decryption (5) Request (7) User Decryption - In case of multiple users, bottleneck problem: : The data owner must encrypt the same data encryption key multiple times. Application Scenario Key Pair public parameters Partial Private key PPK A P A KGC User secret value x A P A S A =(xA, PPKA) ID A Encryption Key’ CL-PKE: Certificateless Public Key Encryption public value P A ID A Goals of CL-PKE 1) To solve the certificate management problem of traditional PKC 2) To solve the key escrow problem of ID based PKC User 2. SetPrivateKey 3. SetPublicKey 7. User-Decrypt KGC SEM 1. SetUp 4. SEM-Key Extract 6. SEM-Decrypt Encryptor 5. Encrypt mCL-PKE: Mediated Certificateless Public Key Encryption Key features of our mCL-PKE without pairings 1) Instantaneous revocation of compromised public keys using Security Mediator(SEM) 2) Solution of the key escrow problem and certificate management problem based on CL-PKC 3) Efficiency based on pairing-free approach 4) Security against CCA (Chosen Ciphertext Attack) and Partial decryption attack Drawbacks of previous work 1) Inefficient pairing based approach 2) Weak Security CPA(Chosen Plaintext Attack), Partial decryption attack

Transcript of An Efficient Certificateless Cryptography Scheme … Efficient Certificateless Cryptography Scheme...

Page 1: An Efficient Certificateless Cryptography Scheme … Efficient Certificateless Cryptography Scheme without Pairing Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino Purdue

An Efficient Certificateless Cryptography Scheme without Pairing Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino

Purdue University

1. Certificateless Public Key Cryptography 2. Mediated CL-PKE without pairing

3. Experimental Results

• Encryption and decryption times of the mCL-PKE for different message size 4. Discussions and Future Work

• Performance comparison with a recent pairing based scheme

• The experimental environment

CPU Memory OS Program Lang. Library

Intel CoreTM i5-2430 CPU @

2.40GHZ

8 GBytes memory

32 bits GNU Linux kernel

C/C++ NTL library version 5.5.2

• Secure data sharing for public cloud computing services

Encrypted Storage

SEM

KGC

User

Data Owner

Encrypt data encryption key using mCL-PKE, Encrypt data using symmetric enc. Algo..

Public Cloud

(3) Get users’ KGC-keys

(4) Encryption

(2) SEM-keys

(1) PK

(2) U-key

(6) SEM Decryption

(5) Request

(7) User Decryption

- In case of multiple users, bottleneck problem: : The data owner must encrypt the same data encryption key multiple times.

Application Scenario

Key Pair

public parameters

Partial Private key PPKA

PA

KGC

User secret value xA

PA SA=(xA, PPKA)

IDA

Encryption Key’

• CL-PKE: Certificateless Public Key Encryption

public value PA

IDA

• Goals of CL-PKE 1) To solve the certificate management problem of traditional PKC 2) To solve the key escrow problem of ID based PKC

User

2. SetPrivateKey 3. SetPublicKey 7. User-Decrypt

KGC SEM

1. SetUp

4. SEM-Key Extract

6. SEM-Decrypt

Encryptor

5. Encrypt

• mCL-PKE: Mediated Certificateless Public Key Encryption

• Key features of our mCL-PKE without pairings 1) Instantaneous revocation of compromised public keys using Security Mediator(SEM) 2) Solution of the key escrow problem and certificate management problem based on CL-PKC 3) Efficiency based on pairing-free approach 4) Security against CCA (Chosen Ciphertext Attack) and Partial decryption attack

• Drawbacks of previous work 1) Inefficient pairing based approach 2) Weak Security – CPA(Chosen Plaintext Attack), Partial decryption attack