Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing
详细信息    查看全文
  • 作者:Wenbo Shi (1)
    Neeraj Kumar (2)
    Peng Gong (3)
    Zezhong Zhang (4)
  • 关键词:certificateless public key cryptography ; signcryption scheme ; bilinear pairings ; elliptic curve ; random oracle model
  • 刊名:Frontiers of Computer Science in China
  • 出版年:2014
  • 出版时间:August 2014
  • 年:2014
  • 卷:8
  • 期:4
  • 页码:656-666
  • 全文大小:344 KB
  • 参考文献:1. Shamir A. Identity based cryptosystems and signature schemes. Lecture Notes in Computer Science, 1984, 196: 47鈥?3 CrossRef
    2. Al-Riyami S, Paterson K. Certificateless public key cryptography. Lecture Notes in Computer Science, 2003, 2894: 452鈥?73 CrossRef
    3. Zhang G, Wang X. Certificateless encryption scheme secure in standard model. Tsinghua Science & Technology, 2009, 14(4): 452鈥?59 CrossRef
    4. Yan X P, Gong P, Bai Z Q, Wang J T, Li P. New certificateless public key encryption scheme without pairing. IET Information Security, 2013, 7(4): 271鈥?76 CrossRef
    5. D. He, J. Chen, R. Zhang. An efficient and provably-secure certificateless signature scheme without bilinear pairings. International Journal of Communication Systems, 2012, 25(11): 1432鈥?442 CrossRef
    6. Gong P, Li P. Further improvement of a certificateless signature scheme without pairing. International Journal of Communication Systems, 2012, DOI: 10.1002/dac.2457
    7. He D B, Chen Y T, Chen J H. An efficient secure certificateless proxy signature scheme without pairings. Mathematical and Computer Modelling, 2013, 57(9鈥?0): 2510鈥?518 CrossRef
    8. He D B, Huang B J, Chen J H. New certificateless short signature scheme. IET Information Security, 2013, 7(2): 113鈥?17 CrossRef
    9. He D B, Chen Y T, Chen J H, Zhang R, Han W W. A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Mathematical and Computer Modelling, 2011, 54(11鈥?2): 3143鈥?152 CrossRef
    10. He D B, Chen Y T, Hu J. A pairing-free certificateless authenticated key agreement protocol. International Journal of Communication Systems, 2012, 25(2): 221鈥?30 CrossRef
    11. He D B, Padhye S, Chen J H. An efficient certificateless two-party authenticated key agreement protocol. Computers & Mathematics with Applications, 2012, 64(2): 1914鈥?926 CrossRef
    12. Sun H, Wen Q, Zhang H, Jin Z. A novel pairing-free certificateless authenticated key agreement protocol with provable security. Frontiers of Computer Science, 2013, 7(4): 544鈥?57 CrossRef
    13. Zheng Y. Digital signcryption or how to achieve cost (signature and encryption) 6 cost (signature) + cost(encryption). Lecture Notes in Computer Science, 1997, 1294: 291鈥?12
    14. An J H, Dodis Y, Rabin T. On the security of joint signature and encryption. Lecture Notes in Computer Science, 2002, 2332: 83鈥?07. CrossRef
    15. Malone-Lee J. Identity based signcryption. Cryptologry ePrint Archive: Report 2002/098, http://eprint.iacr.org/2002/098
    16. Barbosa M, Farshim P. Certificateless signcryption. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. 2008, 369鈥?72
    17. Wu C, Chen Z. A new efficient certificateless signcryption scheme. In: Proceedings of the 2008 International Symposium on Information Science and Engieering. 2008, 661鈥?64
    18. Selvi S S D, Vivek S S, Rangan U. On the security of certificateless signcryption schemes. Cryptology ePrint Archive: Report 2009/298, http://eprint.iacr.org/2009/298
    19. Xie W, Zhang Z. Efficient and provably secure certificateless signcryption from bilinear maps. Cryptology ePrint Archive: Report 2009/578, http://eprmt.iacr.org/2009/578
    20. Selvi S S D, Vivek S S, Ragan C P. Security weaknesses in two certificateless signcryption schemes. Cryptology ePrint Archive: Report 2010/092. http://eprint.iacr.org/2010/092
    21. Liu Z, Hu Y, Zhang X, Ma H. Certificateless signcryption scheme in the standard model. Information Sciences, 2010, 180(3): 452鈥?64 CrossRef
    22. Weng J, Yao G, Deng R H, Chen M, Li X. Cryptanalysis of a certificateless signcryption scheme in the standard model. Information Sciences, 2011, 181(3): 661鈥?67 CrossRef
    23. Chen L Q, Cheng Z H, Smart N P. Identity-based key agreement protocols from pairings. International Journal of Information Security, 2007, 6(2): 213鈥?41 CrossRef
    24. Cao X, Kou W. A pairing-free identity-based authenticated key agreement scheme with minimal message exchanges. Information Sciences, 2010, 180(2): 2895鈥?903 CrossRef
    25. He D B, Chen Y T, Hu J. An ID-based proxy signature schemes without bilinear pairings. Annals of Telecommunications, 2011, 66(11鈥?2): 657鈥?62
    26. Barreto P, Deusajute A, Cruz E, Pereira G, Silva R. Toward efficient certificateless signcryption from (and without) bilinear pairings. http://sbseg2008.inf.ufrgs.br/proceedings/data/pdf/st03_03_artigo.pdf
    27. Selvi S S D, Vivek S S, Ragan C P. Cryptanalysis of certificateless sign cryption schemes and an efficient construction without pairing. Lecture Notes in Computer Science, 2010, 6151: 75鈥?2 CrossRef
    28. Xie W, Zhang Z. Certificateless signcryption without pairing. Cryptology ePrint Archive: Report 2010/187, http://eprint.iacr.org/2010/187
    29. Zhu H, Li H, Wang Y. Certificateless signcryption scheme without pairing. Journal of Computer Research and Development, 2010, 47(9): 1587鈥?594
    30. Liu W, Xu C. Certificateless signcryption scheme without bilinear pairing. Journal of Software, 2011, 22(8): 1918鈥?926 CrossRef
    31. Jing X. Provably secure certificateless signcryption scheme without pairing. In: Proceedings of the 2011 International Conference on Electronic & Mechanical Engineering and Information Technology. 2011, 4753鈥?756 CrossRef
    32. He D B. Security analysis of a certificateless signcryption scheme, Journal of Software (Chinese), 2013, 24(3): 618鈥?22 CrossRef
    33. David P, Jacque S. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 2000, 13(3): 361鈥?96 CrossRef
  • 作者单位:Wenbo Shi (1)
    Neeraj Kumar (2)
    Peng Gong (3)
    Zezhong Zhang (4)

    1. Department of Electronic Engineering, Northeastern University at Qinhuangdao, Qinhuangdao, 066004, China
    2. Department of Computer Science and Engineering, Thapar University, Patiala, 147004, India
    3. National Key Laboratory of Mechatronic Engineering and Control, School of Mechatronical Engineering, Beijing Institute of Technology, Beijing, 100081, China
    4. The Yellow River Institute of Science, North China University of Water Conservancy & Electric Power, Zhengzhou, 450011, China
  • ISSN:1673-7466
文摘
As an improtant cryptographic scheme, signcryption scheme has been widely used in applications since it could provide both of signature and encryption. With the development of the certificateless public key cryptography (CLPKC), many certificatelss signcryption (CLSC) schemes using bilinear pairing hve been proposed. Comparated other operations, the bilinear pairing operaion is much more compulicated. Therefore, CLSC scheme without bilinear pairing is more suitable for applications. Recently, Jing et al. proposed a CLSC scheme without bilinear pairing and claimed their scheme is secure against two types of adversaries. In this paper, we will show their scheme provide neither unforgeability property nor confidentiality property. To improve security, we also propose a new CLSC scheme without pairing and demonstrate it is provably secure in the random oracle model.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700