声明
Contents
Abstract
摘要
Preface
Chapter 1 Introduction
1.1 Public Key Cryptography(PKC)
1.1.1 Traditional PKC
1.1.2 Identity-based PKC
1.1.3 Certificateless PKC
1.2 Malicious KGC and Related Works
1.3 Chapter Summary
Chapter 2 Preliminaries
2.1 Some Basic Concepts
2.1.1 Bilinear Maps
2.1.2 Complexity Assumptions
2.1.3 Hush Function
2.2 Provable Security
2.3 Random Oracle Model
2.4 Standard Model
2.5 Chapter Summary
Chapter 3 Analysis of CLE Scheme
3.1 Formal Definition and Security Model
3.1.1 Formal Definition
3.1.2 Security Model
3.2 Additional Comment
3.3 Chapter Summary
Chapter 4 Cryptanalysis of Some CLE Schemes
4.1 Security Analysis for ZW Scheme
4.1.1 Review of ZW Scheme
4.1.2 Malicious KGC attack to ZW Scheme
4.2 Security Analysis for HL Scheme
4.2.1 Review of HL Scheme
4.2.2 Type Ⅱ Attacks to HL Scheme
4.3 Chapter Summary
Chapter 5 Secure CLE Schemes in the Standard Model
5.1 Our CLE Scheme 1
5.1.1 The Construction
5.1.2 Security and Efficiency Analysis
5.2 Our CLE Scheme 2
5.2.1 The Construction
5.2.2 Security and Efficiency Analysis
5.3 Performance Comparison
5.4 Chapter Summary
Chapter 6 Conclusions and Future Works
Bibliography
Acknowledgements
Publications
Project Experience