Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2014, Vol. 8 Issue (4) : 656-666    https://doi.org/10.1007/s11704-014-3245-0
RESEARCH ARTICLE
Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing
Wenbo SHI1, Neeraj KUMAR2, Peng GONG3(), Zezhong ZHANG4
1. Department of Electronic Engineering, Northeastern University at Qinhuangdao, Qinhuangdao 066004, China
2. Department of Computer Science and Engineering, Thapar University, Patiala 147004, India
3. National Key Laboratory of Mechatronic Engineering and Control, School of Mechatronical Engineering, Beijing Institute of Technology, Beijing 100081, China
4. The Yellow River Institute of Science, North China University of Water Conservancy & Electric Power, Zhengzhou 450011, China
 Download: PDF(322 KB)  
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

As an improtant cryptographic scheme, signcryption scheme has been widely used in applications since it could provide both of signature and encryption. With the development of the certificateless public key cryptography (CLPKC), many certificatelss signcryption (CLSC) schemes using bilinear pairing hve been proposed. Comparated other operations, the bilinear pairing operaion is much more compulicated. Therefore, CLSC scheme without bilinear pairing is more suitable for applications. Recently, Jing et al. proposed a CLSC scheme without bilinear pairing and claimed their scheme is secure against two types of adversaries. In this paper, we will show their scheme provide neither unforgeability property nor confidentiality property. To improve security, we also propose a new CLSC scheme without pairing and demonstrate it is provably secure in the random oracle model.

Keywords certificateless public key cryptography      signcryption scheme      bilinear pairings      elliptic curve      random oracle model     
Corresponding Author(s): Peng GONG   
Issue Date: 11 August 2014
 Cite this article:   
Wenbo SHI,Neeraj KUMAR,Peng GONG, et al. Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing[J]. Front. Comput. Sci., 2014, 8(4): 656-666.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-014-3245-0
https://academic.hep.com.cn/fcs/EN/Y2014/V8/I4/656
1 A Shamir. Identity based cryptosystems and signature schemes. Lecture Notes in Computer Science, 1984, 196: 47−53
https://doi.org/10.1007/3-540-39568-7_5
2 S Al-Riyami, K Paterson. Certificateless public key cryptography. Lecture Notes in Computer Science, 2003, 2894: 452−473
https://doi.org/10.1007/978-3-540-40061-5_29
3 G Zhang, X Wang. Certificateless encryption scheme secure in standard model. Tsinghua Science & Technology, 2009, 14(4): 452−459
https://doi.org/10.1016/S1007-0214(09)70101-4
4 X P Yan, P Gong, Z Q Bai, J T Wang, P Li. New certificateless public key encryption scheme without pairing. IET Information Security, 2013, 7(4): 271−276
https://doi.org/10.1049/iet-ifs.2012.0257
5 D. He, J. Chen, R. Zhang. An efflcient and provably-secure certificateless signature scheme without bilinear pairings. International Journal of Communication Systems, 2012, 25(11): 1432−1442
https://doi.org/10.1002/dac.1330
6 P Gong, P Li. Further improvement of a certificateless signature scheme without pairing. International Journal of Communication Systems, 2012,
https://doi.org/10.1002/dac.2457
7 D B He, Y T Chen, J H Chen. An efflcient secure certificateless proxy signature scheme without pairings. Mathematical and Computer Modelling, 2013, 57(9−10): 2510−2518
https://doi.org/10.1016/j.mcm.2012.12.037
8 D B He, B J Huang, J H Chen. New certificateless short signature scheme. IET Information Security, 2013, 7(2): 113−117
https://doi.org/10.1049/iet-ifs.2012.0176
9 D B He, Y T Chen, J H Chen, R Zhang, W W Han. A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Mathematical and Computer Modelling, 2011, 54(11−12): 3143−3152
https://doi.org/10.1016/j.mcm.2011.08.004
10 D B He, Y T Chen, J Hu. A pairing-free certificateless authenticated key agreement protocol. International Journal of Communication Systems, 2012, 25(2): 221−230
https://doi.org/10.1002/dac.1265
11 D B He, S Padhye, J H Chen. An efflcient certificateless two-party authenticated key agreement protocol. Computers & Mathematics with Applications, 2012, 64(2): 1914−1926
https://doi.org/10.1016/j.camwa.2012.03.044
12 H Sun, Q Wen, H Zhang, Z Jin. A novel pairing-free certificateless authenticated key agreement protocol with provable security. Frontiers of Computer Science, 2013, 7(4): 544−557
https://doi.org/10.1007/s11704-013-2305-1
13 Y Zheng. Digital signcryption or how to achieve cost (signature and encryption) 6 cost (signature) + cost(encryption). Lecture Notes in Computer Science, 1997, 1294: 291−312
https://doi.org/10.1007/BFb0052234
14 J H An, Y Dodis, T Rabin. On the security of joint signature and encryption. Lecture Notes in Computer Science, 2002, 2332: 83−107.
https://doi.org/10.1007/3-540-46035-7_6
15 J Malone-Lee. Identity based signcryption. Cryptologry ePrint Archive: Report 2002/098,
16 M Barbosa, P Farshim. Certificateless signcryption. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. 2008, 369−372
17 C Wu, Z Chen. A new efflcient certificateless signcryption scheme. In: Proceedings of the 2008 International Symposium on Information Science and Engieering. 2008, 661−664
18 S S D Selvi, S S Vivek, U Rangan. On the security of certificateless signcryption schemes. Cryptology ePrint Archive: Report 2009/298,
19 W Xie, Z Zhang. Efflcient and provably secure certificateless signcryption from bilinear maps. Cryptology ePrint Archive: Report 2009/578,
20 S S D Selvi, S S Vivek, C P Ragan. Security weaknesses in two certificateless signcryption schemes. Cryptology ePrint Archive: Report 2010/092.
21 Z Liu, Y Hu, X Zhang, H Ma. Certificateless signcryption scheme in the standard model. Information Sciences, 2010, 180(3): 452−464
https://doi.org/10.1016/j.ins.2009.10.011
22 J Weng, G Yao, R H Deng, M Chen, X Li. Cryptanalysis of a certificateless signcryption scheme in the standard model. Information Sciences, 2011, 181(3): 661−667
https://doi.org/10.1016/j.ins.2010.09.037
23 L Q Chen, Z H Cheng, N P Smart. Identity-based key agreement protocols from pairings. International Journal of Information Security, 2007, 6(2): 213−241
https://doi.org/10.1007/s10207-006-0011-9
24 X Cao, W Kou. A pairing-free identity-based authenticated key agreement scheme with minimal message exchanges. Information Sciences, 2010, 180(2): 2895−2903
https://doi.org/10.1016/j.ins.2010.04.002
25 D B He, Y T Chen, J Hu. An ID-based proxy signature schemes without bilinear pairings. Annals of Telecommunications, 2011, 66(11−12): 657−662
26 P Barreto, A Deusajute, E Cruz, G Pereira, R Silva. Toward efflcient certificateless signcryption from (and without) bilinear pairings.
27 S S D Selvi, S S Vivek, C P Ragan. Cryptanalysis of certificateless sign-cryption schemes and an efflcient construction without pairing. Lecture Notes in Computer Science, 2010, 6151: 75−92
https://doi.org/10.1007/978-3-642-16342-5_6
28 W Xie, Z Zhang. Certificateless signcryption without pairing. Cryptology ePrint Archive: Report 2010/187,
29 H Zhu, H Li, Y Wang. Certificateless signcryption scheme without pairing. Journal of Computer Research and Development, 2010, 47(9): 1587−1594
30 W Liu, C Xu. Certificateless signcryption scheme without bilinear pairing. Journal of Software, 2011, 22(8): 1918−1926
https://doi.org/10.3724/SP.J.1001.2011.03891
31 X Jing. Provably secure certificateless signcryption scheme without pairing. In: Proceedings of the 2011 International Conference on Electronic & Mechanical Engineering and Information Technology. 2011, 4753−4756
32 D B He. Security analysis of a certificateless signcryption scheme, Journal of Software (Chinese), 2013, 24(3): 618−622
https://doi.org/10.3724/SP.J.1001.2013.04245
33 P David, S Jacque. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 2000, 13(3): 361−396
https://doi.org/10.1007/s001450010003
[1] Xinghua LI, Ting CHEN, Qingfeng CHENG, Jianfeng MA. An efficient and authenticated key establishment scheme based on fog computing for healthcare system[J]. Front. Comput. Sci., 2022, 16(4): 164815-.
[2] Momeng LIU, Yupu HU. Universally composable oblivious transfer from ideal lattice[J]. Front. Comput. Sci., 2019, 13(4): 879-906.
[3] Wei GAO, Guilin WANG, Kefei CHEN, Xueli WANG. Efficient identity-based threshold decryption scheme from bilinear pairings[J]. Front. Comput. Sci., 2018, 12(1): 177-189.
[4] Huiyan ZHAO,Jia YU,Shaoxia DUAN,Xiangguo CHENG,Rong HAO. Key-insulated aggregate signature[J]. Front. Comput. Sci., 2014, 8(5): 837-846.
[5] Lin CHENG, Qiaoyan WEN, Zhengping JIN, Hua ZHANG. Cryptanalysis and improvement of a certificateless encryption scheme in the standard model[J]. Front. Comput. Sci., 2014, 8(1): 163-173.
[6] Rajeev Anand SAHU, Sahadeo PADHYE. Efficient ID-based proxy multi-signature scheme secure in random oracle[J]. Front Comput Sci, 2012, 6(4): 421-428.
[7] WANG Lingling, ZHANG Guoyin, MA Chunguang. ID-based deniable ring authentication with constant-size signature[J]. Front. Comput. Sci., 2008, 2(1): 106-112.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed