Abstract
Boneh et al. introduced mediated RSA (mRSA) in 2001 in an attempt to achieve faster key revocation for medium-sized organizations via the involvement of a security mediator (SEM) as a semi-trusted third party to provide partial ciphertext decryption for the receiver. In this paper, a pairing-free security mediated encryption scheme based on an ElGamal variant is proposed. The scheme features a similar setting as in the mediated RSA but with a different underlying primitive. We show that the proposed security mediated encryption scheme is secure indistinguishably against chosen-ciphertext attack (IND-CCA) in the random oracle via the hardness assumption of the computational Diffie-Hellman (CDH) problem.
1. Introduction
In 2001, Boneh et al. proposed a fast key revocation scheme—the mediated RSA (mRSA). This scheme features a new semi-trusted role, the security mediator (SEM), which takes part in the decryption process. The idea behind this mediated scheme is that the user’s secret key is effectively split into two parts, with one kept by SEM and the remaining one by the user. Whenever the user receives a ciphertext, he must relay it to SEM for partial decryption (token issuance) prior to recovering the full plaintext [1]. This property provides an advantage of instant revocation upon the certificate authority (CA) instructions. The SEM will stop assisting in the user’s partial ciphertext decryption, not only to decrypt ciphertext received in the future, but also to re-decrypt the ciphertext that has been received and decrypted previously.
The introduction of mRSA has initiated various security mediated schemes following this path such as the IB-mRSA/OAEP, a type of identity-based encryption (IBE) scheme proposed by Ding and Tsudik in 2003 based on mRSA [2]. The designed IB-mRSA/OAEP is proven to be secure indistinguishably against adaptive chosen-ciphertext attack (IND-CCA) in the random oracle model. To this end, the authors stated that the security proof in the standard model remains an open problem.
Chow et al. then introduced the notion of security mediated certificateless (SMC) cryptography in 2006 that provides the solution to the key escrow problem described in other security mediated schemes [3]. Besides generalizing the framework of SMC, they also provided a lightweight version of SMC cryptography that is fully adaptive chosen-ciphertext attack secure in the random oracle model via the intractability assumption of bilinear Diffie-Hellman (BDH) problem. In addition, Chow et al. claimed that their proposal is more efficient than Baek and Zheng’s ID-based mediated encryption scheme [4].
Following the trend of SMC cryptography by Chow et al., Yap et al. subsequently explored the notion of SMC signature. They proposed the very first concrete provable secure SMC signature scheme that is bilinear pairing-free. Based on the intractability assumption of the discrete logarithm problem (DLP), their scheme is proven to be existentially unforgeable under chosen message attack (EUF-CMA) in the random oracle mode [5]. In the same year, Yang et al. [6] and Lo et al. [7] came out with efficient certificateless pairing-free encryption schemes and mediated revocation-free encryption schemes respectively. Unfortunately, both the proposed schemes suffered from partial decryption attacks as demonstrated in [8]. Wan et al. also proposed a similar efficient pairing-free SMC signature scheme, but with proof of security in the random oracle model based on the hardness assumption of factoring [9].
While the majority of follow-ups focus on mediated IBE and signature schemes, Chin et al. in 2013 devised the first efficient security mediated identity-based identification (SM-IBI) scheme. Via the computational Diffie-Hellman (CDH) assumption, they provided the security proof against impersonation under passive, active and concurrent attacks in the random oracle model [10]. In the following year, Chin et al. further improved the efficiency of the SM-IBI scheme by proposing two pairing-free versions via the intractability of RSA and discrete logarithm assumptions, with security proofs against impersonation under passive, active and concurrent attacks both in the random oracle models [11].
In this paper, we propose a new security mediated encryption scheme based on an IND-CCA secure ElGamal variant. The motivation of our work is based on current existing non-certificateless mediated schemes by Boneh et al. [1]. We consider the IND-CCA-secure ElGamal encryption scheme designed by [12] and prove that our scheme is secure indistinguishably against chosen-ciphertext attack (IND-CCA) in the random oracle model via the hardness assumption of the computational Diffie-Hellman (CDH) problem.
The rest of the paper is organized as follows. Section 2 outlines necessary preliminaries, followed by a formal security model and definition of security mediated encryption scheme. In Section 3, the construction of a new security mediated encryption scheme based on an ElGamal variant is presented. Next, we provide the security proof of our designed scheme in Section 4. The analysis about the efficiency and performance proceedes in Section 5. Finally, we conclude our work in Section 6.
2. Preliminaries
We provide some mathematical and cryptographic backgrounds related to our work in this section, including mathematical hard problems, security mediated encryption scheme model, and corresponding security model. We note that the primary reference of our definitions in this section are due to [13], but similar definitions can be found in [14].
2.1. Computational Diffie-Hellman (CDH) Problem
Definition 1
(Computational Diffie-Hellman Problem [13]). Let g be a generator for and let be non-zero elements of . Define . That is, if and , then
The CDH problem is to compute for uniform and .
2.2. Security Mediated Encryption Scheme
A generic security mediated encryption scheme consists of three probabilistic polynomial-time algorithms:
- KeyGen. On input of security parameter , generates system parameters , user’s public key , and user–SEM secret keys .
- Encrypt. Sender takes in , and message m, encrypts message into ciphertext c = Enc(Params, pk,m).
- Decrypt. Receiver firstly relay ciphertext c to SEM for partial decryption m1 = Dec(c, Ksem) meanwhile computing his own part m2 = Dec(c, Kuser). Finally, receiver performs full decryption to recover message , where ∗ represents necessary operation according to different scheme’s setting.
2.3. Security Model of Security Mediated Encryption Scheme
The following defines the IND-CCA security game corresponds to the security mediated encryption scheme above.
- Setup. On input of security parameter , challenger adapts and runs KeyGen of the encryption scheme to generate . provides adversary with and retains the .
- Phase 1 (Decryption query). The following queries may be asked adaptively.
- (a)
- SEM-Decryption: queries SEM-decryption for the ciphertext C of his choice. responds with the corresponding SEM’s partial decryption to .
- (b)
- Full Decryption: queries full decryption for the ciphertext C of his choice. responds with decrypted plaintext m to .
- Challenge. produces two messages of equal length to be challenged. randomly picks and outputs challenge ciphertext C* = Enc(Params, pk,mb) to .
- Phase 2. may perform decryption queries for the ciphertext C of his choice as in Phase 1, except the challenge ciphertext .
- Guess. output a guess of , ending the simulation. wins if .
Definition 2 (Indistinguishability against Chosen-Ciphertext Attack (IND-CCA) [13]). A public-key encryption scheme is said to be IND-CCA secure if the guessing advantage of a probabilistic polynomial-time (PPT) , is negligible. That is,
3. The Proposed Security Mediated ElGamal Encryption Scheme
We now describe the design of our security mediated encryption scheme based on the IND-CCA-secure ElGamal variant proposed by [12]. Our design involves some structural modifications in order to fit the concept of the security mediated cryptography. Hereafter, we use mediated ElGamal scheme (or abbreviated as ) to denote the proposed security mediated encryption scheme. We point out some highlights of our proposed mediated ElGamal scheme below.
- The user’s public key (abbreviated as ) X in the KeyGen Algorithm 1 is generated by CA using the user’s random master secret key (abbreviated as ) x which is unknown to anyone except CA itself.
- Next, the secret key x is split into two parts and sent securely to the user and SEM respectively as their decryption key.
- Any party who wishes to initiate communication shall obtain the user’s public key X from a public directory as part of the encryption procedure.
We now present the full mediated ElGamal scheme as follows. The Algorithm 1 of Key Generation describes the initial setting of system parameters including the public-private key pair, Algorithm 2 outlines the encryption procedures between sender and receiver, and Algorithm 3 shows the decryption of both SEM and receiver upon receiving the ciphertext.
| Algorithm 1 Key Generation (KeyGen) of |
| Require: Security parameter . |
| Ensure: System parameters , user’s public key X, user’s secret key x, user’s decryption key , and SEM’s decryption key . |
| 1: On input of security parameter , generates two large primes with , a generator g such that , and two groups of order q. |
| 2: Generates the following pairing function and hash functions H such that: |
| (a) , |
| (b) , |
| (c) , |
| (d) , |
| (e) . |
| 3: For each user i, computes for a random integer . |
| 4: Randomly selects and computes (mod ). |
| 5: Publish system parameters and user i’s , sends user i’s decryption key to user i and SEM’s decryption key to SEM. |
| 6: The integer which is user i’s secret key, is kept secret. |
| Algorithm 2 Encryption (Encrypt) of |
| Require: System parameters , user’s public key X, user’s decryption key and message m. |
| Ensure: Ciphertext . |
| 1: User i who wishes to communicate will compute and publish his public key using his decryption key . |
| 2: Sender who wishes to send message m to user i obtains and perform following computations: |
| (a) Selects a random string and computes , |
| (b) Computes and next , |
| (c) Set , and compute , |
| (d) Computes . |
| (e) Computes . |
| 3: Sends ciphertext to user i. |
| Algorithm 3 Decryption (Decrypt) of |
| Require: System parameters , user’s public key X, user’s public key Y, user’s decryption key , SEM’s decryption key and ciphertext . |
| Ensure: Message m. |
| SEM-Decryption: |
| 1: User i upon receiving ciphertext , relays it to SEM. |
| 2: SEM checks whether . If it does, computes partial decryption and replies it to user i. Otherwise, it rejects ciphertext C. |
| User-Decryption: |
| 1: User i receives partial decryption from SEM, and next compute the following series of computations to recover message m: |
| (a) Checks whether . If it does, then continue the decryption procedures. Otherwise, it rejects ciphertext C, |
| (b) Computes , and next , |
| (c) Computes , and checks whether . If it does, then parse message m from . Otherwise, it rejects ciphertext C. |
| 2: Lastly, computes , and verifies whether . |
Proof of correctness. The correctness of the proposed mediated ElGamal scheme begins with the ciphertext validation by SEM, that is
Next, one can easily verify the correctness of the combination of both the partial decryptions from SEM and user i respectively such that
so that . Then, one can proceed with the decryption of , followed by the verification of . This next enables the extraction of and message m from the string of and finally checks whether . ☐
Remark 1.
As is the concatenation of σ and message m, while σ is of n-bit, it is possible for a user to extract σ and m efficiently from it for the next ciphertext integrity check.
4. Security Proof of the Proposed Mediated ElGamal Scheme
We put forward in this section the indistinguishability against chosen-ciphertext attack (IND-CCA) security proof of our proposed mediated ElGamal scheme. Our proof is constructed based on the hardness assumption of solving the CDH problem.
Theorem 1.
Let be the proposed mediated ElGamal scheme as described in Section 3, and be a probabilistic polynomial-time (PPT) adversary that has access tomEG. Then the proposed mediated ElGamal scheme is secure indistinguishably against chosen-ciphertext attack (IND-CCA) in the random oracle model via assumption that solving the computational Diffie-Hellman (CDH) problem is hard. That is,
where ε denotes the negligible function, and and represent the number of and queries, respectively.
Proof.
Suppose there exists an adversary who can break the mediated ElGamal scheme, then we can construct a challenger to solve the CDH problem. is given the CDH instances of of cyclic group , and modeled all as random oracles. We now describe the interaction between the challenger and adversary in the following game.
- Setup: Challenger initially takes on security parameter as input and runs KeyGen to output system parameters and sets public key as where . These system parameters and public key are sent to . Note that does not know the secret integer x.
- H-query: prepares four different hash lists to record and store all the hash queries and responses. The lists are initially empty.
- (a)
- -query: For any query made, checks if such query exist. If it does, it responds with the corresponding . Otherwise, it randomly samples and returns . Lastly, it adds to the -list.
- (b)
- -query: For any query made, checks if such query exist. If it does, it responds with the corresponding . Otherwise, it randomly chooses and returns . Lastly, it updates to the -list.
- (c)
- -query: For any query made, checks if such query exist. If it does, it responds with the corresponding . Otherwise, it randomly chooses and returns . Lastly, it adds to the -list.
- (d)
- -query: For any query made, checks if such query exist. If it does, it responds with the corresponding . Otherwise, it randomly samples and returns . Lastly, it updates to the -list.
- Phase 1 (Decryption query):
- (a)
- SEM-Decryption query: queries the SEM-decryption of the ciphertext of his choice. firstly search through the and -lists whether there exists the pairs of and such that and are valid. If it does, it computes as SEM’s partial decryption and returns the SEM-Decryption result to . Otherwise, it returns ⊥. Observe thatThen, andis a valid SEM’s partial decryption in the simulation.
- (b)
- Full-Decryption query: queries the full decryption of the ciphertext of his choice. firstly search through all the H-lists whether there exists the pairs of such thatWe consider the following possible scenarios:
- Case 1: If all the above queries exists, it outputs and returns the corresponding m as decryption result.
- Case 2: Only , and exist. Then and are valid. Also, by the knowledge of from C, can extract from w and next to extract m from v. It can then compute and adds the new query to the -list. Note that it is easy to verify the validity of such additional query since by , can invert to obtain U. If every query is valid, it returns m as decryption result, otherwise it returns ⊥.
- Case 3: Only and exist. Then and are valid. Also, by the knowledge of from C, can extract from w. It can next compute and samples a random U to updates both the new and queries to the H-lists. Note that it is easy to verify the validity of all such additional queries since by , can invert to obtain v and sample a random V. In addition, the inverted v enables the extraction of m. If every query is valid, it returns m as decryption result, otherwise it returns ⊥.
- Case 4: Only exists. Then is valid. Also, by the knowledge of from C, can extract from w. It can next compute and samples a random U to updates all the new and and queries to the H-lists. Again, it is easy to decide the validity of all such additional queries since by , can invert to obtain v and sample a random V. In addition, the inverted v enables the extraction of m. As for the query of , reverts and then samples z randomly, this is indistinguishable from the ’s point of view. If every query is valid, it returns m as decryption result, otherwise it returns ⊥.
- Case 5: If none of the queries satisfy the ciphertext structures, it returns ⊥.
- Challenge: When is ready to perform the attack, he sends two distinct messages of equal length . randomly selects bit , and . Next, it outputs challenge ciphertext aswhere is taken from the CDH instance. Observe that the challenge ciphertext could be treated as the encryption of message using the random chosen string such that
- (a)
- ,
- (b)
- ,
- (c)
- ,
- (d)
- .
Hence, the challenge ciphertext is a correct and valid ciphertext in the ’s point of view if it does not query the following to random oracle: - Phase 2: is allowed to continue querying decryption of the ciphertext C of his choice, except the challenge ciphertext .
- Guess: finally output his guess of , ending the IND-CCA game. wins the game if . Note that the challenge hash query is the Diffie-Hellman shared value which is a query to the random oracle . randomly selects one of the queries in -list as the challenge hash query, and output the solution to the CDH problem.
It remains now to evaluate the advantage of the simulated game described above. We discuss the following two possible cases that could happen:
- Scenario 1. If does not query the challenge hash query , then the only alternative way that it could break the challenge ciphertext is to search for the existence of the following queries:from the -list; orfrom -list, which has the total negligible probability of , where represents the total number of and queries, respectively.
- Scenario 2. If does query the challenge hash query , then it can gain advantage in guessing the encrypted message correctly. Otherwise, it can only guess it with negligible advantage. As has the advantage of in outputting the correct bit following the hardness assumption of breaking the CDH problem, such event could only occur if and only if the challenge hash query exists in the list. Let be the total number of queries in the simulated game, following the IND-CCA model, we have:
Putting both the above cases together, hence
This completes the proof of security of the proposed mediated ElGamal scheme. ☐
5. Efficiency and Performance Analysis
We discuss the efficiency and performance about the proposed mediated ElGamal encryption scheme in Section 3. We emphasize a few important points based on our proposal as follows:
- Key escrow. Our proposed mediated ElGamal scheme currently does not consider the issue of key escrow. In other words, our scheme suffered from key escrow problem, in which the CA has absolute control of the user’s secret key. Therefore, we assume that CA is not compromise-able and is wholly trusted. We will address this issue in the subsequent work.
- Non-certificateless. Our proposed mediated ElGamal scheme is not certificateless as in the SMC by [3]. In other words, users’ public keys will need to be submitted to CA for authentication.
- Integrity. As we apply the Fujisaki-Okamoto transformation in our design, the proposed mediated ElGamal scheme does provide ciphertext integrity checks either on the SEM side, or on the receiver side on top of ensuring confidentiality of the encrypted message.
- Pairing-free. Unlike some other mediated encryption schemes, our mediated ElGamal scheme is pairing-free in the sense that we do not involve pairing computations in the encryption and decryption. One can observe easily that the pairing function in our scheme only serves to provide ciphertext validity check by SEM and the receiver. Hence, our scheme does not suffer from major efficiency and cost-computation drawbacks.
- Novelty. Current security mediated cryptography focuses on ID-based, signature schemes, or is mostly designed based on pairing functions. Our proposed mediated ElGamal scheme on the other hand, utilized the ElGamal variant as our primitive and is also pairing-free in the encryption and decryption.
The overall computational efficiency of our proposed mediated ElGamal scheme is presented in Table 1 below.
Table 1.
Computational Efficiency of The Proposed Mediated ElGamal Encryption Scheme.
Next, we summarize the performances of the current existing mediated encryption schemes, including both the traditional and IBE types in the following Table 2. We excluded the ciphertext validity check upon receiving the ciphertext tuple by either SEM or user in this summary, as some mediated schemes (i.e., in [6,7]) do not provide such computations in their original proposal.
Table 2.
Computation Performance of Security Mediated Encryption Schemes.
In this Table 2, ‘’ denotes exponentiation, ‘’ indicates multiplication, ‘⊕’ represents exclusive-OR, ‘’ denotes hash, and ‘’ means pairing.
Algebraically, our proposed mediated ElGamal scheme utilizes different primitive and at a glance, the performance is somewhat undesirable compared to mRSA [1]. Such occurrence is due to the Fujisaki-Okamoto transformation in the IND-CCA ElGamal variant, which is not required in mRSA.
Observe that the SEM that operates on the central server has the most extensive operational overhead upon deployment. This is because it caters to all the communication interactions. On the other hand, encryption and user-decryption occur at individual sites and occurs once in a while. One can assume long intervals of inactivity when compared to the server site.
In the context of cryptographic deployment, the current recommended key length required by RSA to achieve 128-bit security is 2048 bits and 1024 bits for discrete logarithm based cryptographic schemes. Hence, our scheme is notably better suited for high volume communication than the pairing-free scheme mRSA.The high volume of operations at the server site is much more efficient via our scheme than mRSA.
For the security mediated IBE schemes, although MCL-PKE [6] gives better efficiency as it is pairing-free, only SMC [3] withstands various cryptanalysis and remain secure among the three. Both MCL-PKE [6] and mRFPKE [7] were broken under a partial decryption attack. Nonetheless, all these three mediated IBE schemes achieved certificateless property and are key-escrow free. On a non-apple-to-apple comparison between our pairing-free with pairing-based schemes, it is evident that our scheme performs better than the discrete logarithm scheme MCL-PKE. Our design has significantly fewer operations in each process. Moreover, further research on our scheme would strive towards certificateless and escrow freeness properties as in MCL-PKE [6].
6. Conclusions
In this paper, a new mediated encryption scheme based on the ElGamal variant is proposed and proved to be IND-CCA secure via the hardness assumption of the computational Diffie-Hellman problem. As this is our first attempt to utilize another well-known primitive in proposing a mediated encryption scheme, it exhibits the key-escrow problem and lack of certificateless property. Our next objective is to provide an overall mediated encryption scheme, resolving all the weaknesses addressed above. Our scheme can easily be transformed into an elliptic curve and pairing-based settings via the hardness assumption of the elliptic curve Diffie-Hellman (ECDH) and bilinear Diffie-Hellman (BDH) problems, respectively. Finally, we expect various schemes to be designed in the future based on the ElGamal variant, such as mediated IBE, signature, IBI, and certificateless-type schemes like those in the existing literature.
Author Contributions
Conceptualization, B.C.T. and M.R.K.A.; methodology, B.C.T. and M.R.K.A.; validation, M.R.K.A.; formal analysis, B.C.T.; investigation, B.C.T., M.R.K.A., A.H.A.G. and M.A.A.; resources, M.R.K.A.; writing—original draft preparation, B.C.T.; writing—review and editing, B.C.T., M.R.K.A., A.H.A.G. and M.A.A.; visualization, B.C.T., M.R.K.A., A.H.A.G. and M.A.A.; supervision, M.R.K.A.; project administration, M.R.K.A.; funding acquisition, M.R.K.A. All authors have read and agreed to the published version of the manuscript.
Funding
The present research was partially supported by the Universiti Putra Malaysia Grant with Project Number GP-IPS/2018/9657300.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Acknowledgments
The first author would like to further express appreciation to the Institute for Mathematical Research (INSPEM), Universiti Putra Malaysia (UPM) and Ministry of Higher Education (MOHE) for giving the opportunity to conduct this research.
Conflicts of Interest
The authors declare no conflict of interest.
Abbreviations
The following abbreviations are used in this manuscript:
| BDH | Bilinear Diffie-Hellman |
| CA | Certificate Authority |
| CDH | Computational Diffie-Hellman |
| DLP | Discrete Logarithm Problem |
| ECDH | Elliptic Curve Diffie-Hellman |
| EUF-CMA | Existential Unforgeable under Chosen-Message Attack |
| IBE | Identity-Based Encryption |
| IB-mRSA/OAEP | Identity-Based Mediated Rivest-Shamir-Adleman/ Optimal Asymmetric Encryption Padding |
| IND-CCA | Indistinguishable against Chosen-Ciphertext Attack |
| mEG | Mediated ElGamal |
| mpk | User’s Public Key |
| mRSA | Mediated Rivest-Shamir-Adleman |
| msk | Master Secret Key |
| PKE | Public-Key Encryption |
| PPT | Probabilistic Polynomial Time |
| RSA | Rivest-Shamir-Adleman |
| SEM | Security Mediator |
| SMC | Security Mediated Certificateless |
| SM-IBI | Security Mediated Identity-Based Identification |
| X-OR | Exclusive-OR |
References
- Boneh, D.; Ding, X.; Tsudik, G.; Wong, C.M. A Method for Fast Revocation of Public Key Certificates and Security Capabilities. In Proceedings of the 10th Conference on USENIX Security Symposium, Washington, DC, USA, 13–17 August 2001. [Google Scholar]
- Ding, X.; Tsudik, G. Simple Identity-Based Cryptography with Mediated RSA. In Topics in Cryptology-CT-RSA 2003; Lecture Notes in Computer Science; Joye, M., Ed.; Springer: Berlin/Heidelberg, Germany, 2003; Volume 2612, pp. 193–210. [Google Scholar]
- Chow, S.S.M.; Boyd, C.; Nieto, J.M.G. Security-Mediated Certificateless Cryptography. In Public Key Cryptography, PKC 2006; Lecture Notes in Computer Science; Yung, M., Dodis, Y., Kiayias, A., Malkin, T., Eds.; Springer: Berlin/Heidelberg, Germany, 2006; Volume 3958, pp. 508–524. [Google Scholar]
- Baek, J.; Zheng, Y. Identity-based Threshold Decryption. In PKC 2004; Lecture Notes in Computer Science; Bao, F., Deng, R., Zhou, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2004; Volume 2947, pp. 262–276. [Google Scholar]
- Yap, W.S.; Chow, S.S.M.; Heng, S.H.; Goi, B.M. Security Mediated Certificateless Signatures. In Applied Cryptography and Network Security; Katz, J., Yung, M., Eds.; ACNS 2007; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2007; Volume 4521, pp. 459–477. [Google Scholar]
- Yang, C.; Wang, F.; Wang, X. Efficient Mediated Certificateless Public-Key Encryption Scheme without Pairings. In Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW’07), Niagara Falls, ON, Canada, 21–23 May 2007; pp. 109–112. [Google Scholar]
- Lo, C.M.; Hwang, T.; Li, C.M. Revocation-Free Public-Key Encryption Based on Security-Mediated Public-Key Infrastructure. Iet Inf. Secur. 2007, 1, 134–141. [Google Scholar] [CrossRef]
- Chow, S.S.M.; Yap, W.-S. Partial Decryption Attacks in Security-Mediated Certificateless Encryption. IET Inf. Secur. 2009, 3, 148–151. [Google Scholar] [CrossRef]
- Wan, Z.; Weng, J.; Li, J. Security Mediated Certificateless Signatures without Pairing. J. Comput. 2010, 5, 1862–1869. [Google Scholar] [CrossRef]
- Chin, J.J.; Behnia, R.; Heng, S.H.; Phan, R.C.W. An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme. In Proceedings of the 2013 Eighth Asia Joint Conference on Information Security, Seoul, Korea, 25–26 July 2013; pp. 27–32. [Google Scholar]
- Chin, J.J.; Tan, S.Y.; Heng, S.H.; Phan, R.C. Efficient and provable secure pairing-free security-mediated identity-based identification schemes. Sci. World J. 2014, 2014, 170906. [Google Scholar] [CrossRef] [PubMed][Green Version]
- Asbullah, M.A.; Ariffin, M.R.K. A proposed CCA-secure encryption on an ElGamal variant. In Proceedings of the 2012 7th International Conference on Computing and Convergence Technology (ICCCT), Seoul, Korea, 3–5 December 2012; pp. 499–503. [Google Scholar]
- Katz, L.; Lindell, Y. Introduction to Modern Cryptography; CRC Press: Boca Raton, FL, USA, 2015. [Google Scholar]
- Lecture Notes: Introduction to Modern Cryptography. Available online: https://web.cs.ucdavis.edu/~rogaway/classes/227/spring05/book/main.pdf (accessed on 14 September 2021).
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).