Skip to main content
Erschienen in: Wireless Personal Communications 4/2015

01.12.2015

On security of a Certificateless Hybrid Signcryption Scheme

verfasst von: Aihan Yin, Hongchao Liang

Erschienen in: Wireless Personal Communications | Ausgabe 4/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Certificateless hybrid signcryption is a newly cryptosystem that plays a great role in some storage-constrained networks when confidentiality and authenticity are needed simultaneously. Now considering almost all certificateless signcryption schemes that have been proposed in the literature cannot effectively against the public-key-replacement attacks. In this paper, we proposed a hybrid signcryption scheme in the certificateless setting to fill this security gaps, and its security has been verified to achieve the confidentiality and unforgeability in random oracle model. Moreover, performance analysis shows the proposed scheme is efficient and practical.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Uhsadel, L., Ullrich, M., Das, A., et al. (2013). Teaching HW/SW co-design with a public key cryptography application. IEEE Transactions on Education, 56(4), 478–483.CrossRef Uhsadel, L., Ullrich, M., Das, A., et al. (2013). Teaching HW/SW co-design with a public key cryptography application. IEEE Transactions on Education, 56(4), 478–483.CrossRef
2.
Zurück zum Zitat Chan, S., Guizani, M., Chen, C., et al. (2014). An enhanced public key infrastructure to secure smart grid wireless communication networks. IEEE Network, 28(1), 10–16. Chan, S., Guizani, M., Chen, C., et al. (2014). An enhanced public key infrastructure to secure smart grid wireless communication networks. IEEE Network, 28(1), 10–16.
3.
Zurück zum Zitat Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In CRYPTO’84. Lecture notes in computer science (Vol. 196, pp. 47–53). Springer: Heidelberg. Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In CRYPTO’84. Lecture notes in computer science (Vol. 196, pp. 47–53). Springer: Heidelberg.
4.
Zurück zum Zitat Malone-Lee, J. (2002). Identity-based signcryption. IACR Cryptology ePrint Archive, 2002, 98. Malone-Lee, J. (2002). Identity-based signcryption. IACR Cryptology ePrint Archive, 2002, 98.
5.
Zurück zum Zitat Hölbl, M., Welzer, T., & Brumen, B. (2012). An improved two-party identity-based authenticated key agreement protocol using pairings. Journal of Computer and System Sciences, 78(1), 142–150.MathSciNetCrossRefMATH Hölbl, M., Welzer, T., & Brumen, B. (2012). An improved two-party identity-based authenticated key agreement protocol using pairings. Journal of Computer and System Sciences, 78(1), 142–150.MathSciNetCrossRefMATH
6.
Zurück zum Zitat Yin, A., Liang, H., & Zhu, M. (2014). Authentication protocol using MYK-NTRUSign signature algorithm in wireless network environment. Journal of Networks, 9(5), 1139–1144.CrossRef Yin, A., Liang, H., & Zhu, M. (2014). Authentication protocol using MYK-NTRUSign signature algorithm in wireless network environment. Journal of Networks, 9(5), 1139–1144.CrossRef
7.
Zurück zum Zitat Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Proceedings of ASIACRYPT 2003. Lecture notes in computer science (Vol. 2894, pp. 452–473). Heidelberg: Springer. Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Proceedings of ASIACRYPT 2003. Lecture notes in computer science (Vol. 2894, pp. 452–473). Heidelberg: Springer.
8.
Zurück zum Zitat Barbosa, M., & Farshim, P. (2008). Certificateless signcryption. In Proceedings of ASIACCS’2008 (pp. 369–372). New York: ACM. Barbosa, M., & Farshim, P. (2008). Certificateless signcryption. In Proceedings of ASIACCS’2008 (pp. 369–372). New York: ACM.
9.
Zurück zum Zitat Han, Y. L., & Gui, X. L. (2009). BPGSC: Bilinear pairing based generalized signcryption scheme. In 2009 eighth international conference on grid and cooperative computing (pp. 76–82) Lanzhou. Han, Y. L., & Gui, X. L. (2009). BPGSC: Bilinear pairing based generalized signcryption scheme. In 2009 eighth international conference on grid and cooperative computing (pp. 76–82) Lanzhou.
10.
Zurück zum Zitat Wu, C., & Chen, Z. (2008). A new efficient certificateless signcryption scheme. In International symposium on information science and engineering, 2008 (ISISE’08) (Vol. 1, pp. 661–664). Shanghai: IEEE. Wu, C., & Chen, Z. (2008). A new efficient certificateless signcryption scheme. In International symposium on information science and engineering, 2008 (ISISE’08) (Vol. 1, pp. 661–664). Shanghai: IEEE.
11.
Zurück zum Zitat Selvi, S. S. D., Vivek, S. S., & Rangan, C. P. (2009). On the security of certificateless signcryption schemes. INSCRYPT, 9, 75–92. Selvi, S. S. D., Vivek, S. S., & Rangan, C. P. (2009). On the security of certificateless signcryption schemes. INSCRYPT, 9, 75–92.
12.
Zurück zum Zitat Selvi, S. S. D., Vivek, S. S., & Rangan, C. P. (Eds.). (2011). Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing. In Information security and cryptology (pp. 75–92). Berlin, Heidelberg: Springer. Selvi, S. S. D., Vivek, S. S., & Rangan, C. P. (Eds.). (2011). Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing. In Information security and cryptology (pp. 75–92). Berlin, Heidelberg: Springer.
13.
Zurück zum Zitat Cramer, R., & Shoup, V. (2003). Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing, 33(1), 167–226.MathSciNetCrossRefMATH Cramer, R., & Shoup, V. (2003). Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing, 33(1), 167–226.MathSciNetCrossRefMATH
14.
Zurück zum Zitat Kurosawa, K., & Desmedt, Y. (2004). A new paradigm of hybrid encryption scheme. Lecture Notes in Computer Science, 3152, 426–442.MathSciNetCrossRef Kurosawa, K., & Desmedt, Y. (2004). A new paradigm of hybrid encryption scheme. Lecture Notes in Computer Science, 3152, 426–442.MathSciNetCrossRef
15.
Zurück zum Zitat Chen, L., Cheng, Z., Malone-Lee, J., & Smart, N. P. (2006). Efficient ID-KEM based on the Sakai-Kasahara key construction. IEE Proceedings-Information Security, 153, 19–26.CrossRef Chen, L., Cheng, Z., Malone-Lee, J., & Smart, N. P. (2006). Efficient ID-KEM based on the Sakai-Kasahara key construction. IEE Proceedings-Information Security, 153, 19–26.CrossRef
16.
Zurück zum Zitat Bentahar, K., Farshim, P., Malone-Lee, J., & Smart, N. P. (2008). Generic constructions of identity-based and certificateless KEMs. Journal of Cryptology, 21, 178–199.MathSciNetCrossRefMATH Bentahar, K., Farshim, P., Malone-Lee, J., & Smart, N. P. (2008). Generic constructions of identity-based and certificateless KEMs. Journal of Cryptology, 21, 178–199.MathSciNetCrossRefMATH
17.
Zurück zum Zitat Li, F., Shirase, M., & Takagi, T. (2013). Certificateless hybrid signcryption. Mathematical and Computer Modelling, 57(3), 324–343.MathSciNetCrossRefMATH Li, F., Shirase, M., & Takagi, T. (2013). Certificateless hybrid signcryption. Mathematical and Computer Modelling, 57(3), 324–343.MathSciNetCrossRefMATH
18.
Zurück zum Zitat Weng, J., Yao, G. X., Deng, R. H., et al. (2011). Cryptanalysis of a certificateless signcryption scheme in the standardmodel. Information Sciences, 181, 661–667.MathSciNetCrossRefMATH Weng, J., Yao, G. X., Deng, R. H., et al. (2011). Cryptanalysis of a certificateless signcryption scheme in the standardmodel. Information Sciences, 181, 661–667.MathSciNetCrossRefMATH
19.
Zurück zum Zitat Selvi, S. S. D., Vivek, S. S., & Rangan, C. P. (2010). Security weaknesses in two certificateless signcryption schemes. IACR Cryptology ePrint Archive, 2010, 92–95. Selvi, S. S. D., Vivek, S. S., & Rangan, C. P. (2010). Security weaknesses in two certificateless signcryption schemes. IACR Cryptology ePrint Archive, 2010, 92–95.
20.
Zurück zum Zitat Zhou, C., Zhou, W., & Dong, X. (2014). Provable certificateless generalized signcryption scheme. Designs, Codes and Cryptography, 71(2), 331–346.MathSciNetCrossRefMATH Zhou, C., Zhou, W., & Dong, X. (2014). Provable certificateless generalized signcryption scheme. Designs, Codes and Cryptography, 71(2), 331–346.MathSciNetCrossRefMATH
21.
Zurück zum Zitat Liu, Z., Hu, Y., Zhang, X., et al. (2010). Certificateless signcryption scheme in the standard model. Information Sciences, 180(3), 452–464.MathSciNetCrossRefMATH Liu, Z., Hu, Y., Zhang, X., et al. (2010). Certificateless signcryption scheme in the standard model. Information Sciences, 180(3), 452–464.MathSciNetCrossRefMATH
22.
Zurück zum Zitat Boneh, D., & Boyen, X. (2011). Efficient selective identity-based encryption without random oracles. Journal of Cryptology, 24(4), 659–693.MathSciNetCrossRefMATH Boneh, D., & Boyen, X. (2011). Efficient selective identity-based encryption without random oracles. Journal of Cryptology, 24(4), 659–693.MathSciNetCrossRefMATH
23.
Zurück zum Zitat Herranz, J., Ruiz, A., & Sáez, G. (2014). Signcryption schemes with threshold unsigncryption, and applications. Designs, Codes and Cryptography, 70(3), 323–345.MathSciNetCrossRefMATH Herranz, J., Ruiz, A., & Sáez, G. (2014). Signcryption schemes with threshold unsigncryption, and applications. Designs, Codes and Cryptography, 70(3), 323–345.MathSciNetCrossRefMATH
24.
Zurück zum Zitat Galbraith, S. D., Paterson, K. G., & Smart, N. P. (2008). Pairings for cryptographers. Discrete Applied Mathematics, 156(16), 3113–3121.MathSciNetCrossRefMATH Galbraith, S. D., Paterson, K. G., & Smart, N. P. (2008). Pairings for cryptographers. Discrete Applied Mathematics, 156(16), 3113–3121.MathSciNetCrossRefMATH
25.
Zurück zum Zitat Granger, R., & Smart, N. P. (2006) On computing products of pairings. IACR Cryptology ePrint Archive, 2006, 172–183. Granger, R., & Smart, N. P. (2006) On computing products of pairings. IACR Cryptology ePrint Archive, 2006, 172–183.
Metadaten
Titel
On security of a Certificateless Hybrid Signcryption Scheme
verfasst von
Aihan Yin
Hongchao Liang
Publikationsdatum
01.12.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2864-6

Weitere Artikel der Ausgabe 4/2015

Wireless Personal Communications 4/2015 Zur Ausgabe

Neuer Inhalt