Security analysis and improvement of a certificateless signcryption scheme
academic paper|更新时间:2024-06-05
|
Security analysis and improvement of a certificateless signcryption scheme
Journal of CommunicationsVol. 36, Issue 3, Pages: 75-80(2015)
作者机构:
华北水利水电大学 水利学院,河南 郑州 450045
作者简介:
基金信息:
The “Twelfth 5-year-plan” Support Plan Projects(2011BAD25B01);The Introduction of High-Level Talents Foundation of North China University of Water Resources and Electric Power(NCWU201248);The Key Technique Program of the Education Department of Henan Province(13A570704)
Zhen-guo ZHAO. Security analysis and improvement of a certificateless signcryption scheme[J]. Journal of Communications, 2015, 36(3): 75-80.
DOI:
Zhen-guo ZHAO. Security analysis and improvement of a certificateless signcryption scheme[J]. Journal of Communications, 2015, 36(3): 75-80. DOI: 10.11959/j.issn.1000-436x.2015060.
Security analysis and improvement of a certificateless signcryption scheme
To solve the certificate management problem in the traditional public key cryptography and the key escrow problem in the identity-based public key cryptography
Al-Riyami and Paterson proposed the concept of the certificateless public key cryptography.Recently
Zhu et al.proposed a certificateless signcryption without bilinear pairings.However, their scheme was completely insecure against with two concrete attacks. A strongly secure certificateless signcryption without bilinear pairings was also proposed
which was provably secure in the random oracle model under the assumption that the discrete logarithm problem and the computational Diffie-Hellman problems were intractable. Furthermore
the efficiency of the proposed scheme is very high since only four modular exponentiations and five modular exponentiations are needed in the signcryption algoriahm and unsigncryption algorithm separately.
关键词
Keywords
references
SHAMIRR A . Identity-based cryptosystem and signature scheme [A ] . Cryptology-Crypto 1984 [C ] . Berlin : Springer-Verlag , 1984 . 47 - 53 .
AL-RIYAMI S , PATERSON K . Certificateless public key cryptography [A ] . Cryptology-Asiacrypt 2003 [C ] . Berlin : Springer-Verlag , 2003 . 452 - 473 .
BARBOSA M , FARSHIM P . Certificateless signcryption [A ] . Proc of the ACM Symp on Information. Computer and Communications Security (ASIACCS 2008) [C ] . 2008 . 369 - 372 .
ARANHA D , CASTROO R , LOPEZ J , et al . Efficient certificateless signcryption [EB/OL ] . http://sbseg2008.inf.ufrgs.br/proceedings/data/pdf/st03_01_resumo.pdf http://sbseg2008.inf.ufrgs.br/proceedings/data/pdf/st03_01_resumo.pdf .
WU C , CHEN Z . A new efficient certificateless signcryption scheme [A ] . Proc of the ISISE 2008 [C ] . Beijing, China , 2008 . 661 - 664 .
SHARMILA D , VIVEK S , PANDU R . On the security of certificate-less signcryption schemes [EB/OL ] . http://eprint.iacr.org/2009/298 http://eprint.iacr.org/2009/298 .
LIU Z , HU Y , ZHANG X , MA H . Certificateless signcryption scheme in the standard model [J ] . Information Sciences , 2010 , 180 ( 1 ): 452 - 464 .
WENG J , YAO G , DDENG R . Cryptanalysis of a certificateless sign-cryption scheme in the standard model [J ] . Information Sciences , 2011 , 181 ( 3 ): 661 - 667 .
ZHOU C , ZHOU W , DONG X . Provable certificateless generalized signcryption scheme [J ] . Designs Codes and Cryptography , 2012 , 71 ( 2 ): 1 - 16 .
CHEN L , CHENG Z , SMART N . Identity-based key agreement pro-tocols from pairings [J ] . Internal Journal of Information Security , 2007 , 6 ( 4 ): 213 - 241 .
HE H , CHEN J , HU J . An ID-based proxy signature schemes without bilinear pairings [J ] . Annals of Telecommunications , 2011 , 66 ( 11-12 ): 657 - 662 .
ZHU H , LI H , WANG Y M . Certificateless signcryption scheme with-out pairing [J ] . Journal of Computer Research and Development , 2010 , 47 ( 9 ): 1587 - 1594 .
POINTCHEVAL D , STERN J . Security arguments for digital signatures and blind signatures [J ] . Journal of Cryptology , 2000 , 13 ( 3 ): 361 - 396 .
CAO X , KOU W , DU X . A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges [J ] . Information Sciences , 2010 , 180 ( 15 ): 2895 - 2903 .