Certificateless Key Agreement in the Standard Model ∗Certificateless Key Agreement • August 19th, 2010
Contract Type FiledAugust 19th, 2010We show how to construct a certificateless key agree- ment protocol from the certificateless key encapsula- tion mechanism introduced by Lippold et al. (2009a) in ICISC 2009 using the Boyd et al. (2008) proto- col from ACISP 2008. We introduce the Canetti- Krawczyk (CK) model for certificateless cryptogra- phy, give security notions for Type I and Type II ad- versaries in the CK model, and highlight the differ- ences to the existing e2CK model discussed by Lip- pold et al. (2009b). The resulting CK model is more relaxed thus giving more power to the adversary than the original CK model.
Certificateless Key Agreement in the Standard Model ∗Certificateless Key Agreement • August 6th, 2010
Contract Type FiledAugust 6th, 2010We show how to construct a certificateless key agree- ment protocol from the certificateless key encapsula- tion mechanism introduced by Lippold et al. (2009a) in ICISC 2009 using the Boyd et al. (2008) proto- col from ACISP 2008. We introduce the Canetti- Krawczyk (CK) model for certificateless cryptogra- phy, give security notions for Type I and Type II ad- versaries in the CK model, and highlight the differ-