Cryptanalysis and improvement of certificateless proxy signcryption scheme for e-prescription system in mobile cloud computing

被引:6
作者
Bhatia, Tarunpreet [1 ]
Verma, A. K. [1 ]
机构
[1] Thapar Univ, Dept Comp Sci & Engn, Patiala, Punjab, India
关键词
Certificateless cryptography; Proxy signcryption; Unforgeability; Mobile cloud; E-prescription;
D O I
10.1007/s12243-017-0595-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Certificateless proxy signcryption (CLPSc) is one of the most efficient security primitives for secure data transmission. The entrustment of signing rights to a proxy signcrypter at the behest of an original signcrypter imparts its utility in various fields such as an online proxy auction, healthcare industry, cloud computing, mobile-agents, ubiquitous computing, etc. Unlike the traditional sign-then-encrypt approach, signcryption primitive saves computational costs and bandwidth load. Recently, a pairing-free CLPSc scheme has been proposed which claims to be secure against forgery under adaptive chosen-message attacks. This paper unveils that the aforementioned scheme has failed to provide unforgeability. As an improvement of their scheme, a novel pairing-free certificateless proxy signcryption scheme using elliptic curve cryptography (ECC) has been proposed for e-prescription system in mobile cloud computing. The proposed scheme is proven to be secure against indistinguishability under adaptive chosen-ciphertext attack and existential forgery under adaptive chosen-message attack in the random oracle model against Type 1 and Type 2 adversaries through formal analysis. The proposed scheme outperforms the existing schemes in terms of computational efficiency making it suitable for futuristic mobile cloud computing applications.
引用
收藏
页码:563 / 576
页数:14
相关论文
共 28 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
[Anonymous], SEC 2 REC ELL CURV D
[3]  
[Anonymous], IACR CRYPTOL EPRINT
[4]  
[Anonymous], 2009, INT C INFORM SECURIT
[5]  
Barbosa M., 2008, P 2008 ACM S INF COM, P369
[6]  
Chao Wang, 2009, Proceedings of the Second International Symposium on Information Science and Engineering (ISISE 2009), P376, DOI 10.1109/ISISE.2009.132
[7]  
El-Kamchouchi H, 2016, INT J COMPUT ELECT A, V10, P1226
[8]  
Gamage C., 1999, COMP SCI P 22 AUSTR, P18
[9]   An ID-based proxy signature schemes without bilinear pairings [J].
He Debiao ;
Chen Jianhua ;
Hu Jin .
ANNALS OF TELECOMMUNICATIONS, 2011, 66 (11-12) :657-662
[10]  
Hu X., 2015, IND ELECT IEEE T, P1, DOI DOI 10.1080/00207160.2015.1086759.