ABSTRACT

Our objective in this chapter is to present certificateless encryption (CLE) schemes that can be proven secure without relying on the random oracle model (a brief introduction to the random oracle model will be presented in Chapter 5). This part begins with the formal definitions of CLE schemes followed by the examination and ranking of existing security models according to the adversaries’ capabilities. Next, we concisely survey the state of the art of CLE schemes so far. Finally, some concrete pairing-based CLE schemes and generic CLE schemes secure in the standard model are shown.