Certificateless Signcryption in the Standard Model

被引:24
|
作者
Zhou, Caixue [1 ,2 ]
Gao, Guangyong [1 ,2 ]
Cui, Zongmin [1 ,2 ]
机构
[1] Jiujiang Univ, Sch Informat Sci & Technol, Jiujiang 332005, Jiangxi, Peoples R China
[2] Jiujiang Univ, Inst Network & Informat Secur, Jiujiang 332005, Jiangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Signcryption; Certificateless signcryption; Standard model; Bilinear pairing; Malicious-but-passive KGC attack; IDENTITY-BASED ENCRYPTION; SCHEME; CRYPTANALYSIS; SECURITY;
D O I
10.1007/s11277-016-3554-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Signcryption can realize encryption and signature simultaneously with lower computational costs and communicational overheads than those of the traditional sign-then-encrypt approach. Certificateless cryptosystem solves the key escrow problem in the identity-based cryptosystem and simplifies the public key management in the traditional public key cryptosystem. There have been some certificateless signcryption schemes proposed in the standard model up to now, but all of them are just proposed in a weaker Type I security model, which is weaker than the original security model of Barbosa and Farshim, who proposed the first certificateless signcryption scheme. In this paper, we propose a certificateless signcryption scheme in the standard model by using bilinear pairings, which is Type I secure in the original security model of Barbosa and Farshim and can resist the malicious-but-passive key generation center Type II attack. The proposed scheme is proved confidential assuming the modified decisional bilinear Diffie-Hellman (M-DBDH) problem is hard, and unforgeable assuming the square computational Diffie-Hellman (Squ-CDH) problem is hard. At last, we evaluate its efficiency which shows it is of high efficiency.
引用
收藏
页码:495 / 513
页数:19
相关论文
共 50 条
  • [31] Secure identity-based signcryption in the standard model
    Li, Fagen
    Takagi, Tsuyoshi
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (11-12) : 2685 - 2694
  • [32] Efficient Identity-Based Signcryption in the Standard Model
    Li, Fagen
    Bin Muhaya, Fahad
    Zhang, Mingwu
    Takagi, Tsuyoshi
    PROVABLE SECURITY, 2011, 6980 : 120 - +
  • [33] Proxy signcryption scheme in the standard model
    Ming, Yang
    Wang, Yumin
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1431 - 1446
  • [34] Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model
    Zhang, Mingwu
    Yang, Bo
    Takagi, Tsuyoshi
    Shen, Yanping
    Zhang, Wenzheng
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2010, 6122 : 77 - +
  • [35] Attribute-Based Signcryption From Lattices in the Standard Model
    Yan, Jianhua
    Wang, Licheng
    Li, Muzi
    Ahmad, Haseeb
    Yue, Jun
    Yao, Wenbin
    IEEE ACCESS, 2019, 7 : 56039 - 56050
  • [36] Efficient Certificateless Signcryption from Bilinear Pairings
    Du, Hongzhen
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 303 - 316
  • [37] Certificateless signcryption scheme based on bilinear pairing
    Tang, Peng-zhi
    Zhang, Qing-lan
    Yang, Jun-fang
    WIRELESS COMMUNICATION AND SENSOR NETWORK, 2016, : 387 - 395
  • [38] Efficient Certificateless Signcryption Scheme
    Yu, Gang
    Yang, Hongzhi
    Fan, Shuqin
    YongShen
    Han, Wenbao
    THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 55 - 59
  • [39] An Improved Certificateless Signcryption Scheme
    Rastegari, Parvin
    Berenjkoub, Mehdi
    2016 13TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2016, : 106 - 111
  • [40] On security of a certificateless signcryption scheme
    Miao, Songqin
    Zhang, Futai
    Li, Sujuan
    Mu, Yi
    INFORMATION SCIENCES, 2013, 232 : 475 - 481