Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing

被引:33
作者
Shi, Wenbo [1 ]
Kumar, Neeraj [2 ]
Gong, Peng [3 ]
Zhang, Zezhong [4 ]
机构
[1] Northeastern Univ Qinhuangdao, Dept Elect Engn, Qinhuangdao 066004, Peoples R China
[2] Thapar Univ, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[3] Beijing Inst Technol, Sch Mechatron Engn, Natl Key Lab Mech Engn & Control, Beijing 100081, Peoples R China
[4] North China Univ Water Conservancy & Elect Power, Yellow River Inst Sci, Zhengzhou 450011, Peoples R China
基金
中国国家自然科学基金;
关键词
certificateless public key cryptography; signcryption scheme; bilinear pairings; elliptic curve; random oracle model; SIGNATURE SCHEME; EFFICIENT;
D O I
10.1007/s11704-014-3245-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As an improtant cryptographic scheme, signcryption scheme has been widely used in applications since it could provide both of signature and encryption. With the development of the certificateless public key cryptography (CLPKC), many certificatelss signcryption (CLSC) schemes using bilinear pairing hve been proposed. Comparated other operations, the bilinear pairing operaion is much more compulicated. Therefore, CLSC scheme without bilinear pairing is more suitable for applications. Recently, Jing et al. proposed a CLSC scheme without bilinear pairing and claimed their scheme is secure against two types of adversaries. In this paper, we will show their scheme provide neither unforgeability property nor confidentiality property. To improve security, we also propose a new CLSC scheme without pairing and demonstrate it is provably secure in the random oracle model.
引用
收藏
页码:656 / 666
页数:11
相关论文
共 33 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
An JH, 2002, LECT NOTES COMPUT SC, V2332, P83
[3]  
Barbosa M., 2008, P 2008 ACM S INF COM, P369
[4]  
Barreto P., EFFICIENT CERTIFICAT
[5]   A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges [J].
Cao, Xuefei ;
Kou, Weidong ;
Du, Xiaoni .
INFORMATION SCIENCES, 2010, 180 (15) :2895-2903
[6]   Identity-based key agreement protocols from pairings [J].
Chen, L. ;
Cheng, Z. ;
Smart, N. P. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (04) :213-241
[7]   Further improvement of a certificateless signature scheme without pairing [J].
Gong, Peng ;
Li, Ping .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (10) :2083-2091
[8]   An efficient and provably-secure certificateless signature scheme without bilinear pairings [J].
He, D. ;
Chen, J. ;
Zhang, R. .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (11) :1432-1442
[9]  
He De-Biao, 2013, Journal of Software, V24, P618, DOI 10.3724/SP.J.1001.2013.04245
[10]   New certificateless short signature scheme [J].
He, Debiao ;
Huang, Baojun ;
Chen, Jianhua .
IET INFORMATION SECURITY, 2013, 7 (02) :113-117