Skip to main content
Top
Published in: Wireless Personal Communications 4/2015

01-12-2015

On security of a Certificateless Hybrid Signcryption Scheme

Authors: Aihan Yin, Hongchao Liang

Published in: Wireless Personal Communications | Issue 4/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Certificateless hybrid signcryption is a newly cryptosystem that plays a great role in some storage-constrained networks when confidentiality and authenticity are needed simultaneously. Now considering almost all certificateless signcryption schemes that have been proposed in the literature cannot effectively against the public-key-replacement attacks. In this paper, we proposed a hybrid signcryption scheme in the certificateless setting to fill this security gaps, and its security has been verified to achieve the confidentiality and unforgeability in random oracle model. Moreover, performance analysis shows the proposed scheme is efficient and practical.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Uhsadel, L., Ullrich, M., Das, A., et al. (2013). Teaching HW/SW co-design with a public key cryptography application. IEEE Transactions on Education, 56(4), 478–483.CrossRef Uhsadel, L., Ullrich, M., Das, A., et al. (2013). Teaching HW/SW co-design with a public key cryptography application. IEEE Transactions on Education, 56(4), 478–483.CrossRef
2.
go back to reference Chan, S., Guizani, M., Chen, C., et al. (2014). An enhanced public key infrastructure to secure smart grid wireless communication networks. IEEE Network, 28(1), 10–16. Chan, S., Guizani, M., Chen, C., et al. (2014). An enhanced public key infrastructure to secure smart grid wireless communication networks. IEEE Network, 28(1), 10–16.
3.
go back to reference Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In CRYPTO’84. Lecture notes in computer science (Vol. 196, pp. 47–53). Springer: Heidelberg. Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In CRYPTO’84. Lecture notes in computer science (Vol. 196, pp. 47–53). Springer: Heidelberg.
4.
go back to reference Malone-Lee, J. (2002). Identity-based signcryption. IACR Cryptology ePrint Archive, 2002, 98. Malone-Lee, J. (2002). Identity-based signcryption. IACR Cryptology ePrint Archive, 2002, 98.
5.
go back to reference Hölbl, M., Welzer, T., & Brumen, B. (2012). An improved two-party identity-based authenticated key agreement protocol using pairings. Journal of Computer and System Sciences, 78(1), 142–150.MathSciNetCrossRefMATH Hölbl, M., Welzer, T., & Brumen, B. (2012). An improved two-party identity-based authenticated key agreement protocol using pairings. Journal of Computer and System Sciences, 78(1), 142–150.MathSciNetCrossRefMATH
6.
go back to reference Yin, A., Liang, H., & Zhu, M. (2014). Authentication protocol using MYK-NTRUSign signature algorithm in wireless network environment. Journal of Networks, 9(5), 1139–1144.CrossRef Yin, A., Liang, H., & Zhu, M. (2014). Authentication protocol using MYK-NTRUSign signature algorithm in wireless network environment. Journal of Networks, 9(5), 1139–1144.CrossRef
7.
go back to reference Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Proceedings of ASIACRYPT 2003. Lecture notes in computer science (Vol. 2894, pp. 452–473). Heidelberg: Springer. Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Proceedings of ASIACRYPT 2003. Lecture notes in computer science (Vol. 2894, pp. 452–473). Heidelberg: Springer.
8.
go back to reference Barbosa, M., & Farshim, P. (2008). Certificateless signcryption. In Proceedings of ASIACCS’2008 (pp. 369–372). New York: ACM. Barbosa, M., & Farshim, P. (2008). Certificateless signcryption. In Proceedings of ASIACCS’2008 (pp. 369–372). New York: ACM.
9.
go back to reference Han, Y. L., & Gui, X. L. (2009). BPGSC: Bilinear pairing based generalized signcryption scheme. In 2009 eighth international conference on grid and cooperative computing (pp. 76–82) Lanzhou. Han, Y. L., & Gui, X. L. (2009). BPGSC: Bilinear pairing based generalized signcryption scheme. In 2009 eighth international conference on grid and cooperative computing (pp. 76–82) Lanzhou.
10.
go back to reference Wu, C., & Chen, Z. (2008). A new efficient certificateless signcryption scheme. In International symposium on information science and engineering, 2008 (ISISE’08) (Vol. 1, pp. 661–664). Shanghai: IEEE. Wu, C., & Chen, Z. (2008). A new efficient certificateless signcryption scheme. In International symposium on information science and engineering, 2008 (ISISE’08) (Vol. 1, pp. 661–664). Shanghai: IEEE.
11.
go back to reference Selvi, S. S. D., Vivek, S. S., & Rangan, C. P. (2009). On the security of certificateless signcryption schemes. INSCRYPT, 9, 75–92. Selvi, S. S. D., Vivek, S. S., & Rangan, C. P. (2009). On the security of certificateless signcryption schemes. INSCRYPT, 9, 75–92.
12.
go back to reference Selvi, S. S. D., Vivek, S. S., & Rangan, C. P. (Eds.). (2011). Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing. In Information security and cryptology (pp. 75–92). Berlin, Heidelberg: Springer. Selvi, S. S. D., Vivek, S. S., & Rangan, C. P. (Eds.). (2011). Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing. In Information security and cryptology (pp. 75–92). Berlin, Heidelberg: Springer.
13.
go back to reference Cramer, R., & Shoup, V. (2003). Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing, 33(1), 167–226.MathSciNetCrossRefMATH Cramer, R., & Shoup, V. (2003). Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing, 33(1), 167–226.MathSciNetCrossRefMATH
14.
go back to reference Kurosawa, K., & Desmedt, Y. (2004). A new paradigm of hybrid encryption scheme. Lecture Notes in Computer Science, 3152, 426–442.MathSciNetCrossRef Kurosawa, K., & Desmedt, Y. (2004). A new paradigm of hybrid encryption scheme. Lecture Notes in Computer Science, 3152, 426–442.MathSciNetCrossRef
15.
go back to reference Chen, L., Cheng, Z., Malone-Lee, J., & Smart, N. P. (2006). Efficient ID-KEM based on the Sakai-Kasahara key construction. IEE Proceedings-Information Security, 153, 19–26.CrossRef Chen, L., Cheng, Z., Malone-Lee, J., & Smart, N. P. (2006). Efficient ID-KEM based on the Sakai-Kasahara key construction. IEE Proceedings-Information Security, 153, 19–26.CrossRef
16.
go back to reference Bentahar, K., Farshim, P., Malone-Lee, J., & Smart, N. P. (2008). Generic constructions of identity-based and certificateless KEMs. Journal of Cryptology, 21, 178–199.MathSciNetCrossRefMATH Bentahar, K., Farshim, P., Malone-Lee, J., & Smart, N. P. (2008). Generic constructions of identity-based and certificateless KEMs. Journal of Cryptology, 21, 178–199.MathSciNetCrossRefMATH
17.
go back to reference Li, F., Shirase, M., & Takagi, T. (2013). Certificateless hybrid signcryption. Mathematical and Computer Modelling, 57(3), 324–343.MathSciNetCrossRefMATH Li, F., Shirase, M., & Takagi, T. (2013). Certificateless hybrid signcryption. Mathematical and Computer Modelling, 57(3), 324–343.MathSciNetCrossRefMATH
18.
go back to reference Weng, J., Yao, G. X., Deng, R. H., et al. (2011). Cryptanalysis of a certificateless signcryption scheme in the standardmodel. Information Sciences, 181, 661–667.MathSciNetCrossRefMATH Weng, J., Yao, G. X., Deng, R. H., et al. (2011). Cryptanalysis of a certificateless signcryption scheme in the standardmodel. Information Sciences, 181, 661–667.MathSciNetCrossRefMATH
19.
go back to reference Selvi, S. S. D., Vivek, S. S., & Rangan, C. P. (2010). Security weaknesses in two certificateless signcryption schemes. IACR Cryptology ePrint Archive, 2010, 92–95. Selvi, S. S. D., Vivek, S. S., & Rangan, C. P. (2010). Security weaknesses in two certificateless signcryption schemes. IACR Cryptology ePrint Archive, 2010, 92–95.
20.
go back to reference Zhou, C., Zhou, W., & Dong, X. (2014). Provable certificateless generalized signcryption scheme. Designs, Codes and Cryptography, 71(2), 331–346.MathSciNetCrossRefMATH Zhou, C., Zhou, W., & Dong, X. (2014). Provable certificateless generalized signcryption scheme. Designs, Codes and Cryptography, 71(2), 331–346.MathSciNetCrossRefMATH
21.
go back to reference Liu, Z., Hu, Y., Zhang, X., et al. (2010). Certificateless signcryption scheme in the standard model. Information Sciences, 180(3), 452–464.MathSciNetCrossRefMATH Liu, Z., Hu, Y., Zhang, X., et al. (2010). Certificateless signcryption scheme in the standard model. Information Sciences, 180(3), 452–464.MathSciNetCrossRefMATH
22.
go back to reference Boneh, D., & Boyen, X. (2011). Efficient selective identity-based encryption without random oracles. Journal of Cryptology, 24(4), 659–693.MathSciNetCrossRefMATH Boneh, D., & Boyen, X. (2011). Efficient selective identity-based encryption without random oracles. Journal of Cryptology, 24(4), 659–693.MathSciNetCrossRefMATH
23.
go back to reference Herranz, J., Ruiz, A., & Sáez, G. (2014). Signcryption schemes with threshold unsigncryption, and applications. Designs, Codes and Cryptography, 70(3), 323–345.MathSciNetCrossRefMATH Herranz, J., Ruiz, A., & Sáez, G. (2014). Signcryption schemes with threshold unsigncryption, and applications. Designs, Codes and Cryptography, 70(3), 323–345.MathSciNetCrossRefMATH
24.
go back to reference Galbraith, S. D., Paterson, K. G., & Smart, N. P. (2008). Pairings for cryptographers. Discrete Applied Mathematics, 156(16), 3113–3121.MathSciNetCrossRefMATH Galbraith, S. D., Paterson, K. G., & Smart, N. P. (2008). Pairings for cryptographers. Discrete Applied Mathematics, 156(16), 3113–3121.MathSciNetCrossRefMATH
25.
go back to reference Granger, R., & Smart, N. P. (2006) On computing products of pairings. IACR Cryptology ePrint Archive, 2006, 172–183. Granger, R., & Smart, N. P. (2006) On computing products of pairings. IACR Cryptology ePrint Archive, 2006, 172–183.
Metadata
Title
On security of a Certificateless Hybrid Signcryption Scheme
Authors
Aihan Yin
Hongchao Liang
Publication date
01-12-2015
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2015
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2864-6

Other articles of this Issue 4/2015

Wireless Personal Communications 4/2015 Go to the issue