Constructing Certificateless Encryption and ID-Based Encryption From ID-Based Key Agreement
The authors discuss the relationship between ID-based key agreement protocols, certificateless encryption and ID-based key encapsulation mechanisms. In particular they show how in some sense ID-based key agreement is a primitive from which all others can be derived. In doing so they focus on distinctions between what they term pure ID-based schemes and non-pure schemes, in various security models. They present security models for ID-based key agreement which do not "Look natural" when considered as analogues of normal key agreement schemes, but which look more natural when considered in terms of the models used in certificateless encryption. The paper highlights distinctions between the two approaches to certificateless encryption, and adds to the debate about what is the "Correct" security model for certificateless encryption.