ZHOU Caixue. Certificateless Signcryption Scheme Without Random Oracles[J]. Chinese Journal of Electronics, 2018, 27(5): 1002-1008. doi: 10.1049/cje.2018.06.002
Citation: ZHOU Caixue. Certificateless Signcryption Scheme Without Random Oracles[J]. Chinese Journal of Electronics, 2018, 27(5): 1002-1008. doi: 10.1049/cje.2018.06.002

Certificateless Signcryption Scheme Without Random Oracles

doi: 10.1049/cje.2018.06.002
Funds:  This work is supported by the National Natural Science Foundation of China (No.61462048, No.61562047, No.61662039).
  • Received Date: 2015-09-11
  • Rev Recd Date: 2018-05-21
  • Publish Date: 2018-09-10
  • Signcryption can realize encryption and signature simultaneously with lower computational costs and communication overhead than those of the traditional sign-then-encrypt approach. Certificateless cryptosystem solves the key escrow problem in the identity-based cryptosystem and simplifies the public key management in the traditional public key cryptosystem. So far there have been some certificateless signcryption schemes proposed in the standard model. However, they are either insecure or inefficient. They need long system public parameters, making it hard to deploy them in the limited storage environments. Based on the Gentry's identity-based encryption scheme, the authors propose a certificateless signcryption scheme in the standard model. Compared with previous schemes, the proposed scheme has not only much higher computational efficiency, but also shorter public parameters. The authors also give rigorous proof of its security.
  • loading
  • H.F. Zhu, Y.A. Tan, X. Yu, et al., “An identity-based proxy signature on NTRU lattice”, Chinese Journal of Electronics, Vol.27, No.2, pp.297-303, 2018.
    T. Wu and X.J. Jing, “Cryptanalysis and improvement of a certificateless signature scheme with strong unforgeability”, Acta Electronica Sinica, Vol.46, No.3, pp.602-606, 2018. (in Chinese)
    Y.W. Zhou, B. Yang and W.Z. Zhang, “Anonymous certificateless signcryption scheme with multi-receiver”, Acta Electronica Sinica, Vol.44, No.8, pp.1784-1790, 2018. (in Chinese)
    M. Barbosa and P. Farshim, “Certificateless signcryption”, Proc. of the 2008 ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, pp.369-372, 2008.
    M. Bellare and P. Rogaway, “Random oracles are practical: A paradigm for designing efficient protocols”, Proc. of the 1st ACM Conference on Computer and Communications Security, Fairfax, USA, pp.62-73, 1993.
    R. Canetti, O. Goldreich and S. Halevi, “The random oracle methodology, revisited”, Journal of the ACM, Vol.51, No.4, pp.557-594, 2004.
    Z.H. Liu, Y.P. Hu, X.S. Zhang, et al., “Certificateless signcryption scheme in the standard model”, Information Sciences, Vol.180, No.3, pp.452-464, 2010.
    S.S.D. Selvi, S.S. Vivek and C.P. Rangan, “Security weaknesses in two certificateless signcryption schemes”, http://eprint.iacr.org/2010/092, 2010-2-20.
    Z.P. Jin, Q.Y. Wen and H. Zhang, “A supplement to Liu et al.’s certificateless signcryption scheme in the standard model”, http://eprint.iacr.org/2010/252, 2010-5-3.
    J. Weng, G.X. Yao, R.H. Deng, et al., “Cryptanalysis of a certificateless signcryption scheme in the standard model”, Information Sciences, Vol.181, No.3, pp.661-667, 2011.
    S.Q. Miao, F.T. Zhang, S.J. Li, et al., “On security of a certificateless signcryption scheme”, Information Sciences, Vol.232, pp.475-481, 2013.
    H. Xiong, “Toward certificateless signcryption scheme without random oracle”, http://eprint.iacr.org/2014/162, 2014-3-3.
    L. Cheng and Q.Y. Wen, “An improved certificateless signcryption in the standard model”, International Journal of Network Security, Vol.17, No.5, pp.597-606, 2015.
    C.X. Zhou, G.Y. Gao and Z.M. Cui, “Certificateless signcryption in the standard model”, Wireless Personal Communicatons, Vol.92, No.2, pp.495-513, 2017.
    M.H. Au, Y. Mu, J. Chen, et al., “Malicious KGC attacks in certificateless cryptography”, Proc. of the 2nd ACM Symposium on Information, Computer and Communications Security, Singapore, Singapore, pp.302-311, 2007.
    Q. Huang and D.S. Wong, “Generic certificateless encryption in the standard model”, International Conference on Advances in Information and Computer Security, Nara, Japan, pp.278-291, 2007.
    H. Xiong, Z.G. Qin and F.G. Li, “An improved certificateless signature scheme secure in the standard model”, Fundamenta Informaticae, Vol.88, No.1, pp.193-206, 2008.
    K. Shim and Y.R. Lee, “Security pitfalls of the certificateless signature and multi-receiver signcryption schemes”, Fundamenta Informaticae, Vol.112, No.4, pp.365-376, 2011.
    L. Cheng, Q.Y. Wen, Z.P. Jin, et al., “Cryptanalysis and improvement of a certificateless encryption scheme in the standard model”, Frontiers in Computer Science, Vol.8., No.1, pp.163-173, 2014.
    Y.M. Yuan and C.H. Wang, “Certificateless signature scheme with security enhanced in the standard model”, Information Processing Letters, Vol.114, No.9, pp.492-499, 2014.
    B. Waters, “Efficient identity-based encryption without random oracles”, Proc. of Advances in Cryptology-EUROCRYPT, Aarhus, Denmark, pp.114-127, 2005.
    C. Gentry, “Practical identity-based encryption without random oracles”, Proc. of Advances in Cryptology-EUROCRYPT, St. Petersburg, Russia, pp.445-464, 2006.
    H. Wang, Y. Zhang, H. Xiong, et al., “Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme”, IET Information Security, Vol.6, No.1, pp.20-27, 2012.
    Y.L. Ren and D.W. Gu, “Efficient identity based signature/signcryption scheme in the standard model”, Proc. of the First International Symposium on Data, Privacy, and ECommerce, ChengDu, China, pp.133-137, 2007.
    “PBC library”, http://crypto.stanford.edu/pbc, 2015.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (199) PDF downloads(259) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return