An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System

被引:4
|
作者
Li, Li [1 ,2 ]
Zhou, Siqin [1 ,2 ]
Choo, Kim-Kwang Raymond [3 ]
Li, Xiaohong [4 ]
He, Debiao [1 ,2 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan, Hubei, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing, Jiangsu, Peoples R China
[3] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX USA
[4] Wuhan Univ, Comp Sch, Wuhan, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1155/2018/7524102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic prescription is increasingly popular in our society, particularly in technologically advanced countries. Due to strict legal requirements and privacy regulations, authorization and data confidentiality are two important features in electronic prescription system. By combining signature and encryption functions, signcryption is an efficient cryptographic primitive that can be used to provide these two features. While signcryption is a fairly established research area, most signcryption schemes proposed recently have several limitations (e.g., high communication costs, limited bandwidth, and insecurity), and designing secure and practical signcryption schemes remains challenging. In this paper, we propose an improved certificateless proxy signcryption (CLPSC) scheme, based on elliptic curve cryptography (ECC). We also demonstrate that the proposed CLPSC scheme is secure in the random oracle model and evaluate its performance with related schemes. The security and performance evaluations show that the proposed CLPSC scheme can potentially be implemented on resource-constrained low-computing mobile devices in an electronic prescription system.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] A provably secure and efficient certificateless signcryption scheme
    Sun, H. (sh1227@163.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [2] Efficient and provably-secure certificateless blind signature scheme
    Yang, Xiao-Yuan
    Chen, Hai-Bin
    Guo, Dun-Tao
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (SUPPL. 2): : 64 - 69
  • [3] Efficient and provably-secure certificateless aggregate signature scheme
    Du, Hong-Zhen
    Huang, Mei-Juan
    Wen, Qiao-Yan
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2013, 41 (01): : 72 - 76
  • [4] Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing
    Wang L.-L.
    Chen K.-F.
    Mao X.-P.
    Wang Y.-T.
    Journal of Shanghai Jiaotong University (Science), 1600, Shanghai Jiaotong University (19): : 398 - 405
  • [5] Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing
    王亮亮
    陈克非
    毛贤平
    王永涛
    JournalofShanghaiJiaotongUniversity(Science), 2014, 19 (04) : 398 - 405
  • [6] Efficient and provably-secure certificateless sequential aggregate signature scheme
    Wang, Zhu
    Yang, Siqi
    Li, Fenghua
    Geng, Kui
    Peng, Tingting
    Shi, Mengyao
    Tongxin Xuebao/Journal on Communications, 2022, 43 (05): : 58 - 67
  • [7] Provably Secure Certificateless Ring Signcryption Scheme
    Qi Zhenghua
    Yang Geng
    Ren Xunyi
    CHINA COMMUNICATIONS, 2011, 8 (03) : 99 - 106
  • [8] An efficient and provably-secure certificateless signature scheme without bilinear pairings
    He, D.
    Chen, J.
    Zhang, R.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (11) : 1432 - 1442
  • [9] A PROVABLY SECURE CERTIFICATELESS PROXY SIGNATURE SCHEME
    Chen, Yu-Chi
    Liu, Chao-Liang
    Horng, Gwoboa
    Chen, Kuo-Chang
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (09): : 5557 - 5569
  • [10] An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs
    Jin, Zhengping
    Zuo, Huijuan
    Du, Hongzhen
    Wen, Qiaoyan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2008, : 189 - 193