Certificateless Generalized Signcryption Scheme without Random Oracles
Author:
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [16]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    This paper studies generalized signcryptions in the certificateless public key settings. The paper proposes the formal definition and security model of certificateless generalized signcryption. The Type II adversary in the security model is malicious, but a passive Type II attacker. Also an efficient construction of certificateless generalized signcryption scheme using bilinear maps is also implemented. The security of proposed scheme is based on the infeasibility of the Computational Diffie-Hellman problem and Decision Bilinear Diffie-Hellman problem. The scheme is formally proven without random oracles under the security model of certificateless generalized signcryption schemes. Due to its security, high efficiency and freedom from certificate management, it may have practical applications in electronic cash payment, firewall and key distribution, etc.

    Reference
    [1] Han YL, Yang XY. New ECDSA—Verifiable generalized signcryption. Chinese Journal of Computers, 2006,29(11):2003-2012 (in Chinese with English abstract).
    [2] Lal S, Kushwah P. ID-Based generalized signcryption. 2008. http://eprint.iacr.org/2008/084.pdf
    [3] Al-Riyami SS, Paterson KG. Certificateless public-key cryptography. In: Proc. of the Asiacrypt 2003. LNCS 2894, Berlin: Spring-Verlag, 2003. 452-473. [doi: 10.1007/978-3-540-40061-5_29]
    [4] Dent AW. A survey of certificateless encryption schemes and security models. Int’l Journal of Information Security, 2008,7(5): 349-377. [doi: 10.1007/s10207-008-0055-0]
    [5] Barbosa M, Farshim P. Certificateless signcryption. In: Proc. of the 2008 ACM Symp. on Information, Computer and Communications Security. 2008. 369-372. [doi: 10.1145/1368310.1368364]
    [6] Aranha D, Castro R, López J, Dahab R. Efficient certificateless signcryption. 2008. http://sbseg2008.inf.ufrgs.br/proceedings/data/pdf/st03_01_resumo.pdf
    [7] Wu CH, Chen ZX. A new efficient certificateless signcryption scheme. In: Proc. of the ISISE 2008. 2008. 661-664. [doi: 10.1109/ISISE.2008.206]
    [8] Selvi SSD, Vivek SS, Rangan CP. Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing. 2009. http://eprint.iacr.org/2009/298.pdf
    [9] Liu ZH, Hu YP, Zhang XS, Ma H. Certificateless signcryption scheme in the standard model. Information Science, 2010,180(3): 452-464. [doi:10.1016/j.ins.2009.10.011]
    [10] Selvi SS, Vivek SS, Rangan CP. Security weaknesses in two certificateless signcryption schemes. 2010. http://eprint.iacr.org/2010/092
    [11] Jin ZP, Wen QY, Zhang H. A supplement to Liu et al.’s certificateless signcryption scheme in the standard model. 2010. http://eprint.iacr.org/2010/252
    [12] Au HM, Mu Y, Chen J, Wong DS, Liu JK, Yang GM. Malicious KGC attacks in certificateless cryptography. In: Deng R, Samarati P, eds. Proc. of the ASIACCS 2007. New York: ACM, 2007. 302-311. [doi: 10.1145/1229285.1266997]
    [13] Wang XA, Yang XY, Han YL. Provable secure generalized signcryption. 2007. http://eprint.iacr.org/2007/173.pdf
    [14] Waters B. Efficient identity based encryption without random oracles. In: Cramer P, ed. Proc. of the Eurocrypt 2005. LNCS 3494, Berlin: Springer-Verlag, 2005. 114-127. [doi: 10.1007/11426639_7]
    [15] Liu JK, Au MH, Susilo W. Self-Generated-Certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In: Deng R, Samarati P, eds. Proc. of the ASIACCS 2007. New York: ACM, 2007. 273-283. [doi: 10.1145/1229285.1266994]
    [16] Dent AW, Libert B, Paterson KG. Certificateless encryption schemes strongly secure in the standard model. In: Cramer ed. Proc. of the 11th Int’l Workshop on Practice and Theory in Public Key Cryptography 2008. LNCS 4939, Berlin: Springer-Verlag, 2008. 344-359. [doi:10.1016/j.ins.2009.10.011]
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

刘连东,冀会芳,韩文报,赵龙.一种无随机预言机的无证书广义签密方案.软件学报,2012,23(2):394-410

Copy
Share
Article Metrics
  • Abstract:4125
  • PDF: 6559
  • HTML: 0
  • Cited by: 0
History
  • Received:May 28,2010
  • Revised:September 29,2010
  • Online: February 07,2012
You are the first2033315Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063