Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

On security of a Certificateless Hybrid Signcryption Scheme

  • 284 Accesses

  • 5 Citations

Abstract

Certificateless hybrid signcryption is a newly cryptosystem that plays a great role in some storage-constrained networks when confidentiality and authenticity are needed simultaneously. Now considering almost all certificateless signcryption schemes that have been proposed in the literature cannot effectively against the public-key-replacement attacks. In this paper, we proposed a hybrid signcryption scheme in the certificateless setting to fill this security gaps, and its security has been verified to achieve the confidentiality and unforgeability in random oracle model. Moreover, performance analysis shows the proposed scheme is efficient and practical.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2

References

  1. 1.

    Uhsadel, L., Ullrich, M., Das, A., et al. (2013). Teaching HW/SW co-design with a public key cryptography application. IEEE Transactions on Education, 56(4), 478–483.

  2. 2.

    Chan, S., Guizani, M., Chen, C., et al. (2014). An enhanced public key infrastructure to secure smart grid wireless communication networks. IEEE Network, 28(1), 10–16.

  3. 3.

    Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In CRYPTO’84. Lecture notes in computer science (Vol. 196, pp. 47–53). Springer: Heidelberg.

  4. 4.

    Malone-Lee, J. (2002). Identity-based signcryption. IACR Cryptology ePrint Archive, 2002, 98.

  5. 5.

    Hölbl, M., Welzer, T., & Brumen, B. (2012). An improved two-party identity-based authenticated key agreement protocol using pairings. Journal of Computer and System Sciences, 78(1), 142–150.

  6. 6.

    Yin, A., Liang, H., & Zhu, M. (2014). Authentication protocol using MYK-NTRUSign signature algorithm in wireless network environment. Journal of Networks, 9(5), 1139–1144.

  7. 7.

    Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Proceedings of ASIACRYPT 2003. Lecture notes in computer science (Vol. 2894, pp. 452–473). Heidelberg: Springer.

  8. 8.

    Barbosa, M., & Farshim, P. (2008). Certificateless signcryption. In Proceedings of ASIACCS’2008 (pp. 369–372). New York: ACM.

  9. 9.

    Han, Y. L., & Gui, X. L. (2009). BPGSC: Bilinear pairing based generalized signcryption scheme. In 2009 eighth international conference on grid and cooperative computing (pp. 76–82) Lanzhou.

  10. 10.

    Wu, C., & Chen, Z. (2008). A new efficient certificateless signcryption scheme. In International symposium on information science and engineering, 2008 (ISISE’08) (Vol. 1, pp. 661–664). Shanghai: IEEE.

  11. 11.

    Selvi, S. S. D., Vivek, S. S., & Rangan, C. P. (2009). On the security of certificateless signcryption schemes. INSCRYPT, 9, 75–92.

  12. 12.

    Selvi, S. S. D., Vivek, S. S., & Rangan, C. P. (Eds.). (2011). Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing. In Information security and cryptology (pp. 75–92). Berlin, Heidelberg: Springer.

  13. 13.

    Cramer, R., & Shoup, V. (2003). Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing, 33(1), 167–226.

  14. 14.

    Kurosawa, K., & Desmedt, Y. (2004). A new paradigm of hybrid encryption scheme. Lecture Notes in Computer Science, 3152, 426–442.

  15. 15.

    Chen, L., Cheng, Z., Malone-Lee, J., & Smart, N. P. (2006). Efficient ID-KEM based on the Sakai-Kasahara key construction. IEE Proceedings-Information Security, 153, 19–26.

  16. 16.

    Bentahar, K., Farshim, P., Malone-Lee, J., & Smart, N. P. (2008). Generic constructions of identity-based and certificateless KEMs. Journal of Cryptology, 21, 178–199.

  17. 17.

    Li, F., Shirase, M., & Takagi, T. (2013). Certificateless hybrid signcryption. Mathematical and Computer Modelling, 57(3), 324–343.

  18. 18.

    Weng, J., Yao, G. X., Deng, R. H., et al. (2011). Cryptanalysis of a certificateless signcryption scheme in the standardmodel. Information Sciences, 181, 661–667.

  19. 19.

    Selvi, S. S. D., Vivek, S. S., & Rangan, C. P. (2010). Security weaknesses in two certificateless signcryption schemes. IACR Cryptology ePrint Archive, 2010, 92–95.

  20. 20.

    Zhou, C., Zhou, W., & Dong, X. (2014). Provable certificateless generalized signcryption scheme. Designs, Codes and Cryptography, 71(2), 331–346.

  21. 21.

    Liu, Z., Hu, Y., Zhang, X., et al. (2010). Certificateless signcryption scheme in the standard model. Information Sciences, 180(3), 452–464.

  22. 22.

    Boneh, D., & Boyen, X. (2011). Efficient selective identity-based encryption without random oracles. Journal of Cryptology, 24(4), 659–693.

  23. 23.

    Herranz, J., Ruiz, A., & Sáez, G. (2014). Signcryption schemes with threshold unsigncryption, and applications. Designs, Codes and Cryptography, 70(3), 323–345.

  24. 24.

    Galbraith, S. D., Paterson, K. G., & Smart, N. P. (2008). Pairings for cryptographers. Discrete Applied Mathematics, 156(16), 3113–3121.

  25. 25.

    Granger, R., & Smart, N. P. (2006) On computing products of pairings. IACR Cryptology ePrint Archive, 2006, 172–183.

Download references

Acknowledgments

This work was partially supported by the National Science Foundation of China under Grants 61262079.

Author information

Correspondence to Hongchao Liang.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Yin, A., Liang, H. On security of a Certificateless Hybrid Signcryption Scheme. Wireless Pers Commun 85, 1727–1739 (2015). https://doi.org/10.1007/s11277-015-2864-6

Download citation

Keywords

  • Certificateless hybrid signcryption
  • Bilinear pairing
  • Provable security
  • Public-key-replacement attacks