|
|
Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing |
Wenbo SHI1, Neeraj KUMAR2, Peng GONG3( ), Zezhong ZHANG4 |
1. Department of Electronic Engineering, Northeastern University at Qinhuangdao, Qinhuangdao 066004, China 2. Department of Computer Science and Engineering, Thapar University, Patiala 147004, India 3. National Key Laboratory of Mechatronic Engineering and Control, School of Mechatronical Engineering, Beijing Institute of Technology, Beijing 100081, China 4. The Yellow River Institute of Science, North China University of Water Conservancy & Electric Power, Zhengzhou 450011, China |
|
|
Abstract As an improtant cryptographic scheme, signcryption scheme has been widely used in applications since it could provide both of signature and encryption. With the development of the certificateless public key cryptography (CLPKC), many certificatelss signcryption (CLSC) schemes using bilinear pairing hve been proposed. Comparated other operations, the bilinear pairing operaion is much more compulicated. Therefore, CLSC scheme without bilinear pairing is more suitable for applications. Recently, Jing et al. proposed a CLSC scheme without bilinear pairing and claimed their scheme is secure against two types of adversaries. In this paper, we will show their scheme provide neither unforgeability property nor confidentiality property. To improve security, we also propose a new CLSC scheme without pairing and demonstrate it is provably secure in the random oracle model.
|
Keywords
certificateless public key cryptography
signcryption scheme
bilinear pairings
elliptic curve
random oracle model
|
Corresponding Author(s):
Peng GONG
|
Issue Date: 11 August 2014
|
|
1 |
A Shamir. Identity based cryptosystems and signature schemes. Lecture Notes in Computer Science, 1984, 196: 47−53
https://doi.org/10.1007/3-540-39568-7_5
|
2 |
S Al-Riyami, K Paterson. Certificateless public key cryptography. Lecture Notes in Computer Science, 2003, 2894: 452−473
https://doi.org/10.1007/978-3-540-40061-5_29
|
3 |
G Zhang, X Wang. Certificateless encryption scheme secure in standard model. Tsinghua Science & Technology, 2009, 14(4): 452−459
https://doi.org/10.1016/S1007-0214(09)70101-4
|
4 |
X P Yan, P Gong, Z Q Bai, J T Wang, P Li. New certificateless public key encryption scheme without pairing. IET Information Security, 2013, 7(4): 271−276
https://doi.org/10.1049/iet-ifs.2012.0257
|
5 |
D. He, J. Chen, R. Zhang. An efflcient and provably-secure certificateless signature scheme without bilinear pairings. International Journal of Communication Systems, 2012, 25(11): 1432−1442
https://doi.org/10.1002/dac.1330
|
6 |
P Gong, P Li. Further improvement of a certificateless signature scheme without pairing. International Journal of Communication Systems, 2012,
https://doi.org/10.1002/dac.2457
|
7 |
D B He, Y T Chen, J H Chen. An efflcient secure certificateless proxy signature scheme without pairings. Mathematical and Computer Modelling, 2013, 57(9−10): 2510−2518
https://doi.org/10.1016/j.mcm.2012.12.037
|
8 |
D B He, B J Huang, J H Chen. New certificateless short signature scheme. IET Information Security, 2013, 7(2): 113−117
https://doi.org/10.1049/iet-ifs.2012.0176
|
9 |
D B He, Y T Chen, J H Chen, R Zhang, W W Han. A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Mathematical and Computer Modelling, 2011, 54(11−12): 3143−3152
https://doi.org/10.1016/j.mcm.2011.08.004
|
10 |
D B He, Y T Chen, J Hu. A pairing-free certificateless authenticated key agreement protocol. International Journal of Communication Systems, 2012, 25(2): 221−230
https://doi.org/10.1002/dac.1265
|
11 |
D B He, S Padhye, J H Chen. An efflcient certificateless two-party authenticated key agreement protocol. Computers & Mathematics with Applications, 2012, 64(2): 1914−1926
https://doi.org/10.1016/j.camwa.2012.03.044
|
12 |
H Sun, Q Wen, H Zhang, Z Jin. A novel pairing-free certificateless authenticated key agreement protocol with provable security. Frontiers of Computer Science, 2013, 7(4): 544−557
https://doi.org/10.1007/s11704-013-2305-1
|
13 |
Y Zheng. Digital signcryption or how to achieve cost (signature and encryption) 6 cost (signature) + cost(encryption). Lecture Notes in Computer Science, 1997, 1294: 291−312
https://doi.org/10.1007/BFb0052234
|
14 |
J H An, Y Dodis, T Rabin. On the security of joint signature and encryption. Lecture Notes in Computer Science, 2002, 2332: 83−107.
https://doi.org/10.1007/3-540-46035-7_6
|
15 |
J Malone-Lee. Identity based signcryption. Cryptologry ePrint Archive: Report 2002/098,
|
16 |
M Barbosa, P Farshim. Certificateless signcryption. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. 2008, 369−372
|
17 |
C Wu, Z Chen. A new efflcient certificateless signcryption scheme. In: Proceedings of the 2008 International Symposium on Information Science and Engieering. 2008, 661−664
|
18 |
S S D Selvi, S S Vivek, U Rangan. On the security of certificateless signcryption schemes. Cryptology ePrint Archive: Report 2009/298,
|
19 |
W Xie, Z Zhang. Efflcient and provably secure certificateless signcryption from bilinear maps. Cryptology ePrint Archive: Report 2009/578,
|
20 |
S S D Selvi, S S Vivek, C P Ragan. Security weaknesses in two certificateless signcryption schemes. Cryptology ePrint Archive: Report 2010/092.
|
21 |
Z Liu, Y Hu, X Zhang, H Ma. Certificateless signcryption scheme in the standard model. Information Sciences, 2010, 180(3): 452−464
https://doi.org/10.1016/j.ins.2009.10.011
|
22 |
J Weng, G Yao, R H Deng, M Chen, X Li. Cryptanalysis of a certificateless signcryption scheme in the standard model. Information Sciences, 2011, 181(3): 661−667
https://doi.org/10.1016/j.ins.2010.09.037
|
23 |
L Q Chen, Z H Cheng, N P Smart. Identity-based key agreement protocols from pairings. International Journal of Information Security, 2007, 6(2): 213−241
https://doi.org/10.1007/s10207-006-0011-9
|
24 |
X Cao, W Kou. A pairing-free identity-based authenticated key agreement scheme with minimal message exchanges. Information Sciences, 2010, 180(2): 2895−2903
https://doi.org/10.1016/j.ins.2010.04.002
|
25 |
D B He, Y T Chen, J Hu. An ID-based proxy signature schemes without bilinear pairings. Annals of Telecommunications, 2011, 66(11−12): 657−662
|
26 |
P Barreto, A Deusajute, E Cruz, G Pereira, R Silva. Toward efflcient certificateless signcryption from (and without) bilinear pairings.
|
27 |
S S D Selvi, S S Vivek, C P Ragan. Cryptanalysis of certificateless sign-cryption schemes and an efflcient construction without pairing. Lecture Notes in Computer Science, 2010, 6151: 75−92
https://doi.org/10.1007/978-3-642-16342-5_6
|
28 |
W Xie, Z Zhang. Certificateless signcryption without pairing. Cryptology ePrint Archive: Report 2010/187,
|
29 |
H Zhu, H Li, Y Wang. Certificateless signcryption scheme without pairing. Journal of Computer Research and Development, 2010, 47(9): 1587−1594
|
30 |
W Liu, C Xu. Certificateless signcryption scheme without bilinear pairing. Journal of Software, 2011, 22(8): 1918−1926
https://doi.org/10.3724/SP.J.1001.2011.03891
|
31 |
X Jing. Provably secure certificateless signcryption scheme without pairing. In: Proceedings of the 2011 International Conference on Electronic & Mechanical Engineering and Information Technology. 2011, 4753−4756
|
32 |
D B He. Security analysis of a certificateless signcryption scheme, Journal of Software (Chinese), 2013, 24(3): 618−622
https://doi.org/10.3724/SP.J.1001.2013.04245
|
33 |
P David, S Jacque. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 2000, 13(3): 361−396
https://doi.org/10.1007/s001450010003
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|