Certificateless Signcryption in the Standard Model

被引:0
作者
Caixue Zhou
Guangyong Gao
Zongmin Cui
机构
[1] Jiujiang University,School of Information Science and Technology
[2] Jiujiang University,Institute of Network and Information Security
来源
Wireless Personal Communications | 2017年 / 92卷
关键词
Signcryption; Certificateless signcryption; Standard model; Bilinear pairing; Malicious-but-passive KGC attack; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
Signcryption can realize encryption and signature simultaneously with lower computational costs and communicational overheads than those of the traditional sign-then-encrypt approach. Certificateless cryptosystem solves the key escrow problem in the identity-based cryptosystem and simplifies the public key management in the traditional public key cryptosystem. There have been some certificateless signcryption schemes proposed in the standard model up to now, but all of them are just proposed in a weaker Type I security model, which is weaker than the original security model of Barbosa and Farshim, who proposed the first certificateless signcryption scheme. In this paper, we propose a certificateless signcryption scheme in the standard model by using bilinear pairings, which is Type I secure in the original security model of Barbosa and Farshim and can resist the malicious-but-passive key generation center Type II attack. The proposed scheme is proved confidential assuming the modified decisional bilinear Diffie–Hellman (M-DBDH) problem is hard, and unforgeable assuming the square computational Diffie–Hellman (Squ-CDH) problem is hard. At last, we evaluate its efficiency which shows it is of high efficiency.
引用
收藏
页码:495 / 513
页数:18
相关论文
共 37 条
[1]  
Li FG(2013)Certificateless hybrid signcryption Mathematical and Computer Modelling 57 324-343
[2]  
Shirase M(2014)Provable certificateless generalized signcryption scheme Designs, Codes and Cryptography 71 331-346
[3]  
Takagi T(2014)Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing Frontiers of Computer Science 8 656-666
[4]  
Zhou CX(2004)The random oracle methodology, revisited Journal of the ACM 51 557-594
[5]  
Zhou W(2010)Certificateless signcryption scheme in the standard model Information Sciences 180 452-464
[6]  
Dong XW(2011)Cryptanalysis of a certificateless signcryption scheme in the standard model Information Sciences 181 661-667
[7]  
Shi WB(2013)On security of a certificateless signcryption scheme Information Sciences 232 475-481
[8]  
Kumar N(2015)An improved certificateless signcryption in the standard model International Journal of Network Security 17 597-606
[9]  
Gong P(2012)Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme IET Information Security 6 20-27
[10]  
Zhang ZZ(2014)Certificateless signature scheme with security enhanced in the standard model Information Processing Letters 114 492-499