Certificateless signcryption scheme in the standard model

被引:90
作者
Liu, Zhenhua [1 ,2 ]
Hu, Yupu [2 ]
Zhang, Xiangsong [1 ]
Ma, Hua [1 ]
机构
[1] Xidian Univ, Dept Appl Math, Xian 710071, Shaanxi, Peoples R China
[2] Xidian Univ, Minist Educ, Key Lab Comp Networks & Informat Secur, Xian 710071, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Certificateless cryptography; Signcryption; Standard model; Bilinear pairings; Provable security; IDENTITY-BASED SIGNCRYPTION; GENERIC CONSTRUCTION; SECURE; ENCRYPTION; SIGNATURE;
D O I
10.1016/j.ins.2009.10.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificateless public key signcryption scheme is an important cryptographic primitive in cryptography. Barbosa and Farshim proposed a certificateless signcryption scheme. However. their construction is proven to be secure in the random oracle model but not the standard model, and the scheme is also vunlerable to the malicious-but-passive key generation center (KGC) attacks. To overcome these disadvantages, we introduce a formal security model for certificateless signcryption schemes secure against the malicious-but-passive KGC attacks and propose a novel certificateless signcryption scheme. The proposed certificateless signcryption scheme is proven to be IND-CCA2 secure under the decisional Bilinear Diffie-Hellman intractability assumption without using the random oracles. The proposed scheme is also proven to be existentially unforgeable under the computational Diffie-Hellman intractability assumptions. Furthermore, performance analysis shows that the proposed scheme is efficient and practical. (C) 2009 Elsevier Inc. All rights reserved.
引用
收藏
页码:452 / 464
页数:13
相关论文
共 35 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
An JH, 2002, LECT NOTES COMPUT SC, V2332, P83
[3]  
[Anonymous], 2002098 CRYPT EPRINT
[4]  
Au M.H., 2007, P 2 ACM S INF COMP C, P302, DOI DOI 10.1145/1229285.1266997
[5]  
Barbosa M., 2008, P 2008 ACM S INF COM, P369
[6]  
Bellare M., 1993, P 1 ACM C COMP COMM, P62
[7]   Generic constructions of identity-based and certificateless KEMs [J].
Bentahar, K. ;
Farshim, P. ;
Malone-Lee, J. ;
Smart, N. P. .
JOURNAL OF CRYPTOLOGY, 2008, 21 (02) :178-199
[8]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[9]  
Boyen X, 2003, LECT NOTES COMPUT SC, V2729, P383
[10]  
Canetti R, 2003, LECT NOTES COMPUT SC, V2656, P255