Citation: | DU Hongzhen, WEN Qiaoyan, ZHANG Shanshan, et al., “A Pairing-Free Certificateless Signcryption Scheme for Vehicular Ad Hoc Networks,” Chinese Journal of Electronics, vol. 30, no. 5, pp. 947-955, 2021, doi: 10.1049/cje.2021.07.006 |
J. Hubaux, S. Capkun and J. Luo, "The security and privacy of smart vehicles", IEEE Security Privacy, Vol.2, No.3, pp.49-55, 2004.
|
M. Raya and J. Hubaux, "Securing vehicular ad hoc networks", Journal of Computer Security, Vol.15, No.1, pp.39-68, 2007.
|
J. Isaac, S. Zeadally and J. Camara, "Security attacks and solutions for vehicular ad hoc networks", IET Communications, Vol.4, No.7, pp.894-903, 2010.
|
R. Lu, X. Lin, H. Zhu, et al., "ECPP:Efficient conditional privacy preservation protocol for secure vehicular communications", 27th IEEE Conference on Computer Communications, Phoenix, AZ, USA, pp.1229-1237, 2008.
|
J. Zhang, M. Xu and L. Liu, "On the security of a secure batch verification with group testing for VANET", International Journal of Network Security, Vol.16, No.5, pp.351-358, 2014.
|
C. Zhang, R. Lu, X. Lin, et al., "An efficient identity-based batch verification scheme for vehicular sensor networks", 27th IEEE Conference on Computer Communications, Phoenix, AZ, USA, pp.246-250, 2008.
|
T. Chim, S. Yiu, L. Hui, et al., "Specs:secure and privacy enhancing communications schemes for VANETs", Ad Hoc Networks, Vol.9, No.2, pp.189-203, 2011.
|
K. Shim, "Cpas:An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks", IEEE Transaction Vehicular Technology, Vol.61, No.4, pp.1874-1883, 2012.
|
S. Horng, S. Tzeng, Y. Pan, et al., "B-specs+:Batch verification for secure pseudonymous authentication in VANET", IEEE Transactions on Information Forensics and Security, Vol.8, No.11, pp.1860-1875, 2013.
|
M. Bayat, M. Barmshoory, M. Rahimi, et al., "A secure authentication scheme for VANETs with batch verification", Wireless Networks, Vol.21, No.5, pp.1733-1743, 2015.
|
D. He, S. Zeadally, B. Xu, et al., "An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks", IEEE Transactions on Information Forensics and Security, Vol.10, No.12, pp.2681-2691, 2015.
|
Y. Zheng, "Digital signcryption or how to achieve cost (signature and encryption) cost (signature) + cost (encryption)", Proc. of Crypto1997, California, USA, pp.165-179, 1997.
|
S. Al-Riyami and K. G. Paterson, "Certificateless public key cryptography", Proc. of Asiacrypt2003, Taipei, Taiwan, LNCS 2894, Berlin, Springer-Verlag, pp.452-473, 2003.
|
M. Barbosa and P. Farshim, "Certificateless signcryption", Proc. of the 2008 ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, pp.369-372, 2008.
|
C. Wu and Z. Chen, "A new efficient certificateless signcryption scheme", Proc. of the International Symposium on Information Science and Engieering (ISISE' 08), Piscataway, NJ, USA, pp.661-664, 2008.
|
W. Xie, Z. Zhang, "Efficient and provably secure certificateless signcryption from bilinear maps", IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), Beijing, China, pp.558-562, 2010.
|
G. Yu, H. Yang, S. Fan, et al., "Efficient certificateless signcryption scheme", Proc. of the Third International Symposium on Electronic Commerce and Security Workshops (ISECS'10), Guangzhou, China, pp.55-59, 2010.
|
P. Li, M. He, X. Li, et al., "Efficient and provably secure certificateless signcryption from bilinear pairings", Journal of Computational Information Systems, Vol.11, No.6, pp.3643-3650, 2010.
|
S. Islam and F. Li, "Leakage-free and provably secure certificateless signcryption scheme using bilinear pairings", The Computer Journal, Vol.58, No.10, pp.2636-2648, 2015.
|
F. Li, M. Shirase and T. Takagi, "Certificateless hybrid signcryption", Mathematical and Computer Modeling, Vol.57, No.3-4, pp.324-343, 2013.
|
F. Li, Y. Han and C. Jin, "Cost-effective and anonymous access control for wireless body area networks", IEEE Systems Journal, Vol.12, No.1, pp.747-758, 2018.
|
A. Yin and H. Liang, "On security of a certificateless hybrid signcryption scheme", Wireless Personal Communications, Vol.85, No.4, pp.1727-1739, 2015.
|
A. Yin and H. Liang, "Certificateless hybrid signcryption scheme for secure communication of wireless sensor networks", Wireless Personal Communications, Vol.80, pp.1049-1062, 2015.
|
C. Zhou, W. Zhou and X. Dong, "Provable certificateless generalized signcryption scheme", Designs Codes and Cryptography, Vol.71, pp.331-346, 2014.
|
L. Cao and W. Ge, "Analysis of certificateless signcryption schemes and construction of a secure and efficient pairingfree one based on ECC", KSII Transactions on Internet and Information Systems, Vol.12, No.9, pp.4527-4547, 2018.
|
A. Waheed, J. Iqbal, N. Din, et al., "Improved cryptanalysis of provable certificateless generalized signcryption", International Journal of Advanced Computer Science and Applications, Vol.10, No.4, pp.610-616, 2019.
|
C. Zhou, "Certificateless signcryption scheme without random oracles", Chinese Journal of Electronics, Vol.27, No.5, pp.1002-1008, 2018.
|
V. Balasubramanian and T. Mala, "Improved certificateless signcryption for IoT smart devices", Applied Mathematics and Information Sciences, Vol.13, No.1, pp.31-38, 2019.
|
A. Arfaoui, O. R. M. Boudia, A. Kribeche, S. -M. Senouci, et al. "Context-aware access control and anonymous authentication in WBAN", Computers & Security, Vol.88, pp.1-16, 2020.
|
H. Zhu, H. Li and Y. Wang, "Certificateless signcryption scheme without pairing", Journal of Computer Research and Development, Vol.47, pp.1587-1594, 2010.
|
W. Liu and C. Xu, "Certificateless signcryption scheme without bilinear pairing", Journal of Software, Vol.22, No.8, pp.1918-1926, 2011. (in Chinese)
|
S. Selvi, S. Vivek and C. Rangan, "Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing", International conference on information security and cryptology, Seoul, Korea, pp.75-92, 2010.
|
W. Shi, N. Kumar, P. Gong and Z. Zhang, "Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing", Frontiers of Computer Science, Vol.8, No.4, pp.656-666, 2014.
|
H. Yu and B Yang, "Pairing-free and secure certificateless signcryption scheme", The Computer Journal, Vol.60, No.8, pp.1187-1196, 2017.
|
S. Mandal, B. Bera, A. K. Sutrala, et al., "Certificateless signcryption-based three-factor user access control scheme for IoT environment", IEEE Internet of Things Journal, Vol.7, No.4, pp.3184-3197.
|
Y. Huang, J. Zhang and H. Chen, "On the security of a certificateless signcryption scheme", Proc. of IWECA2014, Ottawa, Canada, pp.664-667, 2014.
|
D. He, "Security analysis of a certificateless signcryption scheme", Journal of Software, Vol.24, No.3, pp.618-622, 2013(in Chinese)
|
X. Lin, L. Sun, H. Qu and D. Liu, "Cryptanalysis of a pairingfree certificateless signcryption scheme", The Computer Journal, Vol.61, No.4, pp.539-544, 2018.
|
B. Zhang, Z. Jia and C. Zhao, "An efficient certificateless generalized signcryption scheme", Security and Communication Networks, Vol.2018, pp.1-11, 2018.
|
A. Zhang, L. Wang, X. Ye, et al., "Light-weight and robust security-aware D2D-assist data transmission protocol for mobile-health systems", IEEE Transactions on Information Forensics and Security, Vol.12, No.3, pp.662-675, 2017.
|
C. Zhou, "An improved lightweight certificateless generalized signcryption scheme for mobile-health system", International Journal of Distributed Sensor Networks, Vol.15, No.1, pp.1-16, 2019.
|
D. Pointcheval and J. Stern, "Security arguments for digital signatures and blind signatures", Journal of Cryptology, Vol.13, No.3, pp.361-396, 2000.
|
H. Du, Q. Wen, S. Zhang, et al., "A new provably-secure certificateless signature scheme for Internet of Things", Ad Hoc Networks, Vol.100, pp.1-10, 2020.
|
J. Xie, Y. Hu, J. Gao and M. Jiang, "Certificateless sequential aggregate signature scheme on NTRU lattice", Chinese Journal of Electronics, Vol.28, No.2, pp.294-300,2019.
|
The Certicom Corporation. "SEC 2:Recommended elliptic curve domain parameters", The Standard for Efficient Cryptography Group, 2000, http://www.secg.org/SEC2-Ver-1.0.pdf,2000-08-17.
|