Skip to main content
Erschienen in: Wireless Personal Communications 2/2017

04.08.2016

Certificateless Signcryption in the Standard Model

verfasst von: Caixue Zhou, Guangyong Gao, Zongmin Cui

Erschienen in: Wireless Personal Communications | Ausgabe 2/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Signcryption can realize encryption and signature simultaneously with lower computational costs and communicational overheads than those of the traditional sign-then-encrypt approach. Certificateless cryptosystem solves the key escrow problem in the identity-based cryptosystem and simplifies the public key management in the traditional public key cryptosystem. There have been some certificateless signcryption schemes proposed in the standard model up to now, but all of them are just proposed in a weaker Type I security model, which is weaker than the original security model of Barbosa and Farshim, who proposed the first certificateless signcryption scheme. In this paper, we propose a certificateless signcryption scheme in the standard model by using bilinear pairings, which is Type I secure in the original security model of Barbosa and Farshim and can resist the malicious-but-passive key generation center Type II attack. The proposed scheme is proved confidential assuming the modified decisional bilinear Diffie–Hellman (M-DBDH) problem is hard, and unforgeable assuming the square computational Diffie–Hellman (Squ-CDH) problem is hard. At last, we evaluate its efficiency which shows it is of high efficiency.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In CRYPTO’84. lecture notes in computer science (vol. 196, pp. 47–53). Heidelberg: Springer. Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In CRYPTO’84. lecture notes in computer science (vol. 196, pp. 47–53). Heidelberg: Springer.
2.
Zurück zum Zitat Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Proceedings of ASIACRYPT 2003. Lecture notes in computer science (vol. 2894, pp. 452–473). Heidelberg: Springer. Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Proceedings of ASIACRYPT 2003. Lecture notes in computer science (vol. 2894, pp. 452–473). Heidelberg: Springer.
3.
Zurück zum Zitat Zheng, Y. L. (1997). Digital signcryption or how to achieve cost (signature & encryption) \(<<\) cost (signature) + cost (encryption). In CRYPTO’97. Lecture notes in computer science (vol. 1294, pp.165-179). Heidelberg: Springer. Zheng, Y. L. (1997). Digital signcryption or how to achieve cost (signature & encryption) \(<<\) cost (signature) + cost (encryption). In CRYPTO’97. Lecture notes in computer science (vol. 1294, pp.165-179). Heidelberg: Springer.
4.
Zurück zum Zitat Barbosa, M., & Farshim, P. (2008). Certificateless signcryption. In Proceedings of ASIACCS’2008 (pp. 369–372). New York: ACM. Barbosa, M., & Farshim, P. (2008). Certificateless signcryption. In Proceedings of ASIACCS’2008 (pp. 369–372). New York: ACM.
5.
Zurück zum Zitat Li, F. G., Shirase, M., & Takagi, T. (2013). Certificateless hybrid signcryption. Mathematical and Computer Modelling, 57(3), 324–343.MathSciNetCrossRefMATH Li, F. G., Shirase, M., & Takagi, T. (2013). Certificateless hybrid signcryption. Mathematical and Computer Modelling, 57(3), 324–343.MathSciNetCrossRefMATH
6.
Zurück zum Zitat Zhou, C. X., Zhou, W., & Dong, X. W. (2014). Provable certificateless generalized signcryption scheme. Designs, Codes and Cryptography, 71(2), 331–346.MathSciNetCrossRefMATH Zhou, C. X., Zhou, W., & Dong, X. W. (2014). Provable certificateless generalized signcryption scheme. Designs, Codes and Cryptography, 71(2), 331–346.MathSciNetCrossRefMATH
7.
Zurück zum Zitat Shi, W. B., Kumar, N., Gong, P., & Zhang, Z. Z. (2014). Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing. Frontiers of Computer Science, 8(4), 656–666.MathSciNetCrossRefMATH Shi, W. B., Kumar, N., Gong, P., & Zhang, Z. Z. (2014). Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing. Frontiers of Computer Science, 8(4), 656–666.MathSciNetCrossRefMATH
8.
Zurück zum Zitat Canetti, R., Goldreich, O., & Halevi, S. (2004). The random oracle methodology, revisited. Journal of the ACM, 51(4), 557–594.MathSciNetCrossRefMATH Canetti, R., Goldreich, O., & Halevi, S. (2004). The random oracle methodology, revisited. Journal of the ACM, 51(4), 557–594.MathSciNetCrossRefMATH
9.
Zurück zum Zitat Liu, Z. H., Hu, Y. P., Zhang, X. S., & Ma, H. (2010). Certificateless signcryption scheme in the standard model. Information Sciences, 180(3), 452–464.MathSciNetCrossRefMATH Liu, Z. H., Hu, Y. P., Zhang, X. S., & Ma, H. (2010). Certificateless signcryption scheme in the standard model. Information Sciences, 180(3), 452–464.MathSciNetCrossRefMATH
12.
Zurück zum Zitat Weng, J., Yao, G. X., Deng, R. H., Chen, M. R., & Li, X. X. (2011). Cryptanalysis of a certificateless signcryption scheme in the standard model. Information Sciences, 181(3), 661–667.MathSciNetCrossRefMATH Weng, J., Yao, G. X., Deng, R. H., Chen, M. R., & Li, X. X. (2011). Cryptanalysis of a certificateless signcryption scheme in the standard model. Information Sciences, 181(3), 661–667.MathSciNetCrossRefMATH
13.
Zurück zum Zitat Miao, S. Q., Zhang, F. T., Li, S. J., & Mu, Y. (2013). On security of a certificateless signcryption scheme. Information Sciences, 232, 475–481.MathSciNetCrossRefMATH Miao, S. Q., Zhang, F. T., Li, S. J., & Mu, Y. (2013). On security of a certificateless signcryption scheme. Information Sciences, 232, 475–481.MathSciNetCrossRefMATH
15.
Zurück zum Zitat Cheng, L., & Wen, Q. Y. (2015). An improved certificateless signcryption in the standard model. International Journal of Network Security, 17(5), 597–606. Cheng, L., & Wen, Q. Y. (2015). An improved certificateless signcryption in the standard model. International Journal of Network Security, 17(5), 597–606.
16.
Zurück zum Zitat Au, M. H., Chen, J., Liu, J. K., Mu, Y., Wong, D. S., & Yang, G. M. (2007). Malicious KGC attacks in certificateless cryptography. In Proceedings of ASIACCS’2007 (pp. 302–311). New York: ACM. Au, M. H., Chen, J., Liu, J. K., Mu, Y., Wong, D. S., & Yang, G. M. (2007). Malicious KGC attacks in certificateless cryptography. In Proceedings of ASIACCS’2007 (pp. 302–311). New York: ACM.
17.
Zurück zum Zitat Wang, H., Zhang, Y., Xiong, H., & Qin, B. (2012). Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme. IET Information Security, 6(1), 20–27.CrossRef Wang, H., Zhang, Y., Xiong, H., & Qin, B. (2012). Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme. IET Information Security, 6(1), 20–27.CrossRef
18.
Zurück zum Zitat Yuan, Y. M., & Wang, C. H. (2014). Certificateless signature scheme with security enhanced in the standard model. Information Processing Letters, 114(9), 492–499.MathSciNetCrossRefMATH Yuan, Y. M., & Wang, C. H. (2014). Certificateless signature scheme with security enhanced in the standard model. Information Processing Letters, 114(9), 492–499.MathSciNetCrossRefMATH
19.
Zurück zum Zitat Waters, B. (2005). Efficient identity-based encryption without random oracles. In EUROCRYPT 2005. Lecture notes in computer science (vol. 3494, pp.114–127). Heidelberg: Springer. Waters, B. (2005). Efficient identity-based encryption without random oracles. In EUROCRYPT 2005. Lecture notes in computer science (vol. 3494, pp.114–127). Heidelberg: Springer.
21.
Zurück zum Zitat Chen, L., Cheng, Z., & Smart, N. P. (2007). Identity-based key agreement protocols from pairings. International Journal of Information Security, 6(4), 213–241.CrossRef Chen, L., Cheng, Z., & Smart, N. P. (2007). Identity-based key agreement protocols from pairings. International Journal of Information Security, 6(4), 213–241.CrossRef
Metadaten
Titel
Certificateless Signcryption in the Standard Model
verfasst von
Caixue Zhou
Guangyong Gao
Zongmin Cui
Publikationsdatum
04.08.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3554-8

Weitere Artikel der Ausgabe 2/2017

Wireless Personal Communications 2/2017 Zur Ausgabe

Neuer Inhalt