Skip to main content
Top
Published in: Annals of Telecommunications 9-10/2017

06-09-2017

Cryptanalysis and improvement of certificateless proxy signcryption scheme for e-prescription system in mobile cloud computing

Authors: Tarunpreet Bhatia, A. K. Verma

Published in: Annals of Telecommunications | Issue 9-10/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Certificateless proxy signcryption (CLPSc) is one of the most efficient security primitives for secure data transmission. The entrustment of signing rights to a proxy signcrypter at the behest of an original signcrypter imparts its utility in various fields such as an online proxy auction, healthcare industry, cloud computing, mobile-agents, ubiquitous computing, etc. Unlike the traditional sign-then-encrypt approach, signcryption primitive saves computational costs and bandwidth load. Recently, a pairing-free CLPSc scheme has been proposed which claims to be secure against forgery under adaptive chosen-message attacks. This paper unveils that the aforementioned scheme has failed to provide unforgeability. As an improvement of their scheme, a novel pairing-free certificateless proxy signcryption scheme using elliptic curve cryptography (ECC) has been proposed for e-prescription system in mobile cloud computing. The proposed scheme is proven to be secure against indistinguishability under adaptive chosen-ciphertext attack and existential forgery under adaptive chosen-message attack in the random oracle model against Type 1 and Type 2 adversaries through formal analysis. The proposed scheme outperforms the existing schemes in terms of computational efficiency making it suitable for futuristic mobile cloud computing applications.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352CrossRef Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352CrossRef
2.
go back to reference Mambo M, Usuda K, Okamoto E (1996) Proxy signature for delegating signature operation. In: Proceedings of the 3rd ACM conference on computer and communications security, New Delhi, India, pp. 48–57 Mambo M, Usuda K, Okamoto E (1996) Proxy signature for delegating signature operation. In: Proceedings of the 3rd ACM conference on computer and communications security, New Delhi, India, pp. 48–57
3.
go back to reference Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques, Santa Barbara, CA, USA, pp. 47–53 Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques, Santa Barbara, CA, USA, pp. 47–53
4.
5.
go back to reference Hwang MS, Tzeng SF, Tsai CS (2004) Generalization of proxy signature based on elliptic curves. Comput Stand Interfaces 26(2):73–84CrossRef Hwang MS, Tzeng SF, Tsai CS (2004) Generalization of proxy signature based on elliptic curves. Comput Stand Interfaces 26(2):73–84CrossRef
7.
go back to reference El-Kamchouchi H, Gaber H, Ahmed F, El-Kamchouchi DH (2016) An efficient proxy signature scheme over a secure communications network. World Acad Sci Eng Technol, Int J Comput Electr Autom Control Inf Eng 10(7):1226–1229 El-Kamchouchi H, Gaber H, Ahmed F, El-Kamchouchi DH (2016) An efficient proxy signature scheme over a secure communications network. World Acad Sci Eng Technol, Int J Comput Electr Autom Control Inf Eng 10(7):1226–1229
8.
go back to reference Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In international conference on the theory and application of cryptology and information security, Taipei, Taiwan, China, pp. 452–473 Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In international conference on the theory and application of cryptology and information security, Taipei, Taiwan, China, pp. 452–473
9.
go back to reference Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption)≪ cost (signature)+ cost (encryption). In annual international cryptology conference, Santa Barbara, California, USA, (pp. 165–179) Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption)≪ cost (signature)+ cost (encryption). In annual international cryptology conference, Santa Barbara, California, USA, (pp. 165–179)
10.
go back to reference Barbosa, M., &Farshim, P. (2008) Certificateless signcryption. In Proceedings of the 2008 ACM symposium on information, computer and communications security, New York, USA, pp. 369–372 Barbosa, M., &Farshim, P. (2008) Certificateless signcryption. In Proceedings of the 2008 ACM symposium on information, computer and communications security, New York, USA, pp. 369–372
11.
go back to reference Yin A, Liang H (2015) Certificateless hybrid Signcryption scheme for secure communication of wireless sensor networks. Wirel Pers Commun 80(3):1049–1062MathSciNetCrossRef Yin A, Liang H (2015) Certificateless hybrid Signcryption scheme for secure communication of wireless sensor networks. Wirel Pers Commun 80(3):1049–1062MathSciNetCrossRef
12.
go back to reference Islam SH, Li F (2015) Leakage-free and provably secure certificateless signcryption scheme using bilinear pairings. Comput J 58(10):2636–2648CrossRef Islam SH, Li F (2015) Leakage-free and provably secure certificateless signcryption scheme using bilinear pairings. Comput J 58(10):2636–2648CrossRef
13.
go back to reference Debiao H, Jianhua C, Jin H (2011) An ID-based proxy signature schemes without bilinear pairings. Ann Telecommun 66(11–12):657–662CrossRef Debiao H, Jianhua C, Jin H (2011) An ID-based proxy signature schemes without bilinear pairings. Ann Telecommun 66(11–12):657–662CrossRef
14.
go back to reference Jing, X. (2011). Provably secure certificateless signcryption scheme without pairing. In electronic and mechanical engineering and information technology (EMEIT), 2011 international conference on, 9, Harbin, Heilongjiang, China, pp. 4753–4756 Jing, X. (2011). Provably secure certificateless signcryption scheme without pairing. In electronic and mechanical engineering and information technology (EMEIT), 2011 international conference on, 9, Harbin, Heilongjiang, China, pp. 4753–4756
15.
go back to reference Selvi SSD, Vivek SS, Rangan CP (2009) Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing. In F. Bao (Ed.), International conference on information security and cryptology, (pp. 75–92). Beijing, China Selvi SSD, Vivek SS, Rangan CP (2009) Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing. In F. Bao (Ed.), International conference on information security and cryptology, (pp. 75–92). Beijing, China
16.
go back to reference Xie W, Zhang Z (2010) Certificateless Signcryption without pairing. IACR Cryptol ePrint Arch 187 Xie W, Zhang Z (2010) Certificateless Signcryption without pairing. IACR Cryptol ePrint Arch 187
17.
go back to reference Shi W, Kumar N, Gong P, Zhang Z (2014) Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing. Front Comput Sci 8(4):656–666MathSciNetCrossRefMATH Shi W, Kumar N, Gong P, Zhang Z (2014) Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing. Front Comput Sci 8(4):656–666MathSciNetCrossRefMATH
18.
go back to reference Gamage C, Leiwo J, Zheng Y (1999) An efficient scheme for secure message transmission using proxy-signcryption. In Proceedings of the 22nd Australasian computer science conference, Sydney, Australia, pp. 420–431 Gamage C, Leiwo J, Zheng Y (1999) An efficient scheme for secure message transmission using proxy-signcryption. In Proceedings of the 22nd Australasian computer science conference, Sydney, Australia, pp. 420–431
19.
go back to reference Jung HY, Lee DH, Lim JI, Chang KS (2001) Signcryption schemes with forward secrecy, proceedings of information security application (WISA’01), Seoul, Korea, pp. 403–475 Jung HY, Lee DH, Lim JI, Chang KS (2001) Signcryption schemes with forward secrecy, proceedings of information security application (WISA’01), Seoul, Korea, pp. 403–475
20.
go back to reference Elkamchouchi HM, Abouelseoud Y (2008) A new proxy identity-based Signcryption scheme for partial delegation of signing rights. IACR Cryptol ePrint Arch 2008:41 Elkamchouchi HM, Abouelseoud Y (2008) A new proxy identity-based Signcryption scheme for partial delegation of signing rights. IACR Cryptol ePrint Arch 2008:41
21.
go back to reference Wang C, Han Y, Li F (2009) A secure mobile agent protocol for m-commerce using self-certified proxy signcryption. In 2009 second international symposium on information science and engineering (ISISE’09), Washington, DC, USA, pp. 376–380 Wang C, Han Y, Li F (2009) A secure mobile agent protocol for m-commerce using self-certified proxy signcryption. In 2009 second international symposium on information science and engineering (ISISE’09), Washington, DC, USA, pp. 376–380
22.
go back to reference Lin HY, Wu TS, Huang SK, Yeh YS (2010) Efficient proxy signcryption scheme with provable CCA and CMA security. Comput Math Appl 60(7):1850–1858MathSciNetCrossRefMATH Lin HY, Wu TS, Huang SK, Yeh YS (2010) Efficient proxy signcryption scheme with provable CCA and CMA security. Comput Math Appl 60(7):1850–1858MathSciNetCrossRefMATH
24.
go back to reference Yanfeng Q, Chunming T, Yu L, Maozhi X, Baoan G (2013) Certificateless proxy identity-based signcryption scheme without bilinear pairings. China Commun 10(11):37–41CrossRef Yanfeng Q, Chunming T, Yu L, Maozhi X, Baoan G (2013) Certificateless proxy identity-based signcryption scheme without bilinear pairings. China Commun 10(11):37–41CrossRef
25.
go back to reference Ming Y, Wang Y (2015) Proxy signcryption scheme in the standard model. Secur Commun Netw 8(8):1431–1446CrossRef Ming Y, Wang Y (2015) Proxy signcryption scheme in the standard model. Secur Commun Netw 8(8):1431–1446CrossRef
26.
go back to reference Zhou CX (2016) Identity based generalized proxy signcryption scheme. Inf Technol Control 45(1):13–26 Zhou CX (2016) Identity based generalized proxy signcryption scheme. Inf Technol Control 45(1):13–26
27.
go back to reference Yeh JH (2014) The insecurity of two proxy signcryption schemes: proxy credential forgery attack and how to prevent it. J Supercomput 70(3):1100–1119CrossRef Yeh JH (2014) The insecurity of two proxy signcryption schemes: proxy credential forgery attack and how to prevent it. J Supercomput 70(3):1100–1119CrossRef
Metadata
Title
Cryptanalysis and improvement of certificateless proxy signcryption scheme for e-prescription system in mobile cloud computing
Authors
Tarunpreet Bhatia
A. K. Verma
Publication date
06-09-2017
Publisher
Springer Paris
Published in
Annals of Telecommunications / Issue 9-10/2017
Print ISSN: 0003-4347
Electronic ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-017-0595-2

Other articles of this Issue 9-10/2017

Annals of Telecommunications 9-10/2017 Go to the issue

Premium Partner