Certificateless Signcryption in the Standard Model

被引:24
|
作者
Zhou, Caixue [1 ,2 ]
Gao, Guangyong [1 ,2 ]
Cui, Zongmin [1 ,2 ]
机构
[1] Jiujiang Univ, Sch Informat Sci & Technol, Jiujiang 332005, Jiangxi, Peoples R China
[2] Jiujiang Univ, Inst Network & Informat Secur, Jiujiang 332005, Jiangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Signcryption; Certificateless signcryption; Standard model; Bilinear pairing; Malicious-but-passive KGC attack; IDENTITY-BASED ENCRYPTION; SCHEME; CRYPTANALYSIS; SECURITY;
D O I
10.1007/s11277-016-3554-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Signcryption can realize encryption and signature simultaneously with lower computational costs and communicational overheads than those of the traditional sign-then-encrypt approach. Certificateless cryptosystem solves the key escrow problem in the identity-based cryptosystem and simplifies the public key management in the traditional public key cryptosystem. There have been some certificateless signcryption schemes proposed in the standard model up to now, but all of them are just proposed in a weaker Type I security model, which is weaker than the original security model of Barbosa and Farshim, who proposed the first certificateless signcryption scheme. In this paper, we propose a certificateless signcryption scheme in the standard model by using bilinear pairings, which is Type I secure in the original security model of Barbosa and Farshim and can resist the malicious-but-passive key generation center Type II attack. The proposed scheme is proved confidential assuming the modified decisional bilinear Diffie-Hellman (M-DBDH) problem is hard, and unforgeable assuming the square computational Diffie-Hellman (Squ-CDH) problem is hard. At last, we evaluate its efficiency which shows it is of high efficiency.
引用
收藏
页码:495 / 513
页数:19
相关论文
共 50 条
  • [21] Certificateless Signcryption with Equality Test
    Zhang Yulei
    Bai Qiaoling
    Ma Yanli
    Yan Chenyang
    Wang Caifen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (09) : 2534 - 2541
  • [22] On the Security of a Certificateless Signcryption Scheme
    Huang, Yueying
    Zhang, Jingang
    Chen, Houyan
    2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 664 - 667
  • [23] Efficient signcryption in the standard model
    Li, Fagen
    Zhang, Mingwu
    Takagi, Tsuyoshi
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (17): : 1977 - 1989
  • [24] Provable certificateless generalized signcryption scheme
    Zhou, Caixue
    Zhou, Wan
    Dong, Xiwei
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 71 (02) : 331 - 346
  • [25] An Efficient Biometric Certificateless Signcryption Scheme
    Luo, Ming
    Huang, Donghua
    Hu, Jun
    JOURNAL OF COMPUTERS, 2013, 8 (07) : 1853 - 1860
  • [26] A New Efficient Certificateless Signcryption Scheme
    Wu, Chen-huang
    Chen, Zhi-xiong
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 661 - 664
  • [27] Cryptanalysis of a Certificateless Ring Signcryption Scheme
    Du, Hongzhen
    Wen, Qiaoyan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 329 - 336
  • [28] Generic Construction of Certificateless Signcryption Scheme
    Kar, Jayaprakash
    Naik, Kshirasagar
    INFORMATION SYSTEMS SECURITY, 2016, 10063 : 489 - 498
  • [29] An Efficient Certificateless Generalized Signcryption Scheme
    Zhang, Bo
    Jia, Zhongtian
    Zhao, Chuan
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [30] Certificateless signcryption KEM to multiple recipients
    Sun Y.-X.
    Li H.
    Li X.-Q.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 32 (09): : 2249 - 2252