Computer Science ›› 2013, Vol. 40 ›› Issue (11): 112-116.

Previous Articles     Next Articles

Provably Secure and Efficient Certificateless Signcryption Scheme

SUN Hua and ZHENG Xue-feng   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Certificateless cryptography eliminates the key escrow problem inherent in identity-based cryptosystems and avoids the complex certificate managerment problem in traditional certificate-based public-key cryptosystems,so it achieves the best advantages of them.Signcryption is a cryptographic primitive that could achieve authentication and confidentiality simultaneously by combining digital signature and public key encryption,while it has lower computational cost than signing and encryption respectively.In this paper,a provably secure certificateless signcryption scheme was proposed,which requires only two bilinear pairing operation in the unsigncryption phase and is much more efficient than the existing ones.In the last,we proved it satisfies indistinguishability against adaptive chosen ciphertext attack and existential unforgeability against adaptive chosen message and identity attack by using the complexity assumptions in the random oracle model.

Key words: Certificateless cryptography,Signcryption,Provable security,Random oracle model

[1] Shamir A.Identity-based cryptosystems and signature schemes[C]∥Proceedings of CRYPTO 1984,LNCS 196.Berlin:Sprin-ger-Verlag,1985:47-53
[2] Al-Riyami S S,Paterson K G.Certificateless public key cryptography[C]∥Proceedings of ASIACRYPT 2003,LNCS 2894.Berlin:Springer-Verlag,2003:452-473
[3] Zheng Yu-liang.Digital signcryption or how to achieve cost(signature & encryption)< [4] An J H,Dodis Y,Rabin T.On the security of joint signature andencryption[C]∥Proceedings of EUROCRYPT 2002,LNCS 2332.Berlin:Springer-Verlag,2002:83-107
[5] Baek J,Steinfeld R,Zheng Yu-liang.Formal proofs for the security of signcryption[J].Journal of Cryptology,2007,20(2):203-235
[6] Barbosa M,Farshim P.Certificateless signcryption[C]∥ Proceedings of ASIACCS 2008.ACM,New York,2008:369-372
[7] Aranha D,Castro R,Lopez J,et al.Efficient certificateless signcryption[EB/OL].http://labcom.inf.ufrgs.br/labcom/ceseg/anais/2008/data/pdf/st03_01_resumo.pdf
[8] Wu Chen-huang,Cheng Zhi-xiong.A new efficient certificateless signcryption scheme[C]∥Proceedings of ISISE 2008.IEEE Computer Society,2008:661-664
[9] Selvi S S D,Vivek S S,Rangan C P.Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing[EB/OL].Cryptology ePrint Archive,2009.http://eprint.iacr.org/2009/298
[10] Selvi S S D,Vivek S S,Shukla D,et al.Efficient and provably secure certificateless multi-receiver signcryption[C]∥Proceedings of ProvSec 2008,LNCS 5324.Berlin:Springer-Verlag,2008:52-67
[11] Xie Wen-jian,Zhang Zhang.Efficient and provably secure certifi-cateless signcryption from bilinear maps[C]∥Proceedings of WCNIS 2010.IEEE Press,2010:558-562
[12] Barreto P S L M,Libert B,Mccullagh N,et al.Efficient and provably-secure identity-based signatures and signcryption from bilinear maps[C]∥Proceedings of ASIACRYPT 2005,LNCS 3788.Berlin:Springer-Verlag,2005:515-532
[13] Chen Yan,Zhang Fu-tai.A new certificateless public key en-cryption scheme[J].Wuhan University Journal of Natural Sciences,2008,13(6):721-726
[14] Selvi S S D,Vivek S S,Rangan C P.Security weaknesses in two certificateless signcryption schemes[EB/OL].Cryptology ePrint Archive,2010.http://eprint.iacr.org/2010/092
[15] Liu Zhen-hua,Hu Yu-pu,Zhang Xiang-song,et al.Certificateless signcryption scheme in the standard model[J].Information Sciences,2010,180(3):452-464
[16] Weng Jian,Yao Guo-xiang,Deng R H,et al.Cryptanalysis of a certificateless signcryption scheme in the standard model[J].Information Sciences,2011,181(3):661-667
[17] Li Peng-cheng,He Ming-xing,Li Xiao,et al.Efficient and prova-bly secure certificateless signcryption from bilinear pairings[J].Journal of Computational Information Systems,2010,6(11):3643-3650
[18] Du Hong-zhen,Wen Qiao-yan.Efficient and provably-securecertificateless short signature scheme from bilinear pairings[J].Computer Standards and Interfaces,2009,31(2):390-394
[19] Javier H,German S.Forking lemmas for ring signature schemes[C]∥Proceedings of INDOCRYPT 2003,LNCS 2904.Berlin:Springer-Verlag,2003:266-279

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!