ABSTRACT

In this book, the basic paradigms and principles of certificate-less cryptography are presented. We particularly discussed the formal definitions of certificateless encryption/certificateless signature (CLE/CLS) schemes followed by an examination and ranking of existing security models according to the adversaries’ capabilities. After that, the design philosophy and the security proof of typical CLE, CLS, and certificateless authenticated key agreement (CL-AKA) schemes secure in the standard model and random oracle model have been analyzed, respectively, along with a brief introduction to the random oracle model. In addition, some applications of certificateless publickey encryption (CL-PKC) in scenarios such as anonymous communication, wireless body area networks (WBANs) and cloud computing, and extensions of CL-PKC have also been investigated. Moreover, we illustrated a comparison between the CL-PKC, certificate-based public-key cryptosystem (CB-PKC), and self-certified public-key cryptosystem (SC-PKC) paradigms.