Advertisement

Wireless Personal Communications

, Volume 85, Issue 4, pp 1727–1739 | Cite as

On security of a Certificateless Hybrid Signcryption Scheme

  • Aihan Yin
  • Hongchao Liang
Article

Abstract

Certificateless hybrid signcryption is a newly cryptosystem that plays a great role in some storage-constrained networks when confidentiality and authenticity are needed simultaneously. Now considering almost all certificateless signcryption schemes that have been proposed in the literature cannot effectively against the public-key-replacement attacks. In this paper, we proposed a hybrid signcryption scheme in the certificateless setting to fill this security gaps, and its security has been verified to achieve the confidentiality and unforgeability in random oracle model. Moreover, performance analysis shows the proposed scheme is efficient and practical.

Keywords

Certificateless hybrid signcryption Bilinear pairing Provable security Public-key-replacement attacks 

Notes

Acknowledgments

This work was partially supported by the National Science Foundation of China under Grants 61262079.

References

  1. 1.
    Uhsadel, L., Ullrich, M., Das, A., et al. (2013). Teaching HW/SW co-design with a public key cryptography application. IEEE Transactions on Education, 56(4), 478–483.CrossRefGoogle Scholar
  2. 2.
    Chan, S., Guizani, M., Chen, C., et al. (2014). An enhanced public key infrastructure to secure smart grid wireless communication networks. IEEE Network, 28(1), 10–16.Google Scholar
  3. 3.
    Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In CRYPTO’84. Lecture notes in computer science (Vol. 196, pp. 47–53). Springer: Heidelberg.Google Scholar
  4. 4.
    Malone-Lee, J. (2002). Identity-based signcryption. IACR Cryptology ePrint Archive, 2002, 98.Google Scholar
  5. 5.
    Hölbl, M., Welzer, T., & Brumen, B. (2012). An improved two-party identity-based authenticated key agreement protocol using pairings. Journal of Computer and System Sciences, 78(1), 142–150.MathSciNetCrossRefMATHGoogle Scholar
  6. 6.
    Yin, A., Liang, H., & Zhu, M. (2014). Authentication protocol using MYK-NTRUSign signature algorithm in wireless network environment. Journal of Networks, 9(5), 1139–1144.CrossRefGoogle Scholar
  7. 7.
    Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Proceedings of ASIACRYPT 2003. Lecture notes in computer science (Vol. 2894, pp. 452–473). Heidelberg: Springer.Google Scholar
  8. 8.
    Barbosa, M., & Farshim, P. (2008). Certificateless signcryption. In Proceedings of ASIACCS’2008 (pp. 369–372). New York: ACM.Google Scholar
  9. 9.
    Han, Y. L., & Gui, X. L. (2009). BPGSC: Bilinear pairing based generalized signcryption scheme. In 2009 eighth international conference on grid and cooperative computing (pp. 76–82) Lanzhou.Google Scholar
  10. 10.
    Wu, C., & Chen, Z. (2008). A new efficient certificateless signcryption scheme. In International symposium on information science and engineering, 2008 (ISISE’08) (Vol. 1, pp. 661–664). Shanghai: IEEE.Google Scholar
  11. 11.
    Selvi, S. S. D., Vivek, S. S., & Rangan, C. P. (2009). On the security of certificateless signcryption schemes. INSCRYPT, 9, 75–92.Google Scholar
  12. 12.
    Selvi, S. S. D., Vivek, S. S., & Rangan, C. P. (Eds.). (2011). Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing. In Information security and cryptology (pp. 75–92). Berlin, Heidelberg: Springer.Google Scholar
  13. 13.
    Cramer, R., & Shoup, V. (2003). Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing, 33(1), 167–226.MathSciNetCrossRefMATHGoogle Scholar
  14. 14.
    Kurosawa, K., & Desmedt, Y. (2004). A new paradigm of hybrid encryption scheme. Lecture Notes in Computer Science, 3152, 426–442.MathSciNetCrossRefGoogle Scholar
  15. 15.
    Chen, L., Cheng, Z., Malone-Lee, J., & Smart, N. P. (2006). Efficient ID-KEM based on the Sakai-Kasahara key construction. IEE Proceedings-Information Security, 153, 19–26.CrossRefGoogle Scholar
  16. 16.
    Bentahar, K., Farshim, P., Malone-Lee, J., & Smart, N. P. (2008). Generic constructions of identity-based and certificateless KEMs. Journal of Cryptology, 21, 178–199.MathSciNetCrossRefMATHGoogle Scholar
  17. 17.
    Li, F., Shirase, M., & Takagi, T. (2013). Certificateless hybrid signcryption. Mathematical and Computer Modelling, 57(3), 324–343.MathSciNetCrossRefMATHGoogle Scholar
  18. 18.
    Weng, J., Yao, G. X., Deng, R. H., et al. (2011). Cryptanalysis of a certificateless signcryption scheme in the standardmodel. Information Sciences, 181, 661–667.MathSciNetCrossRefMATHGoogle Scholar
  19. 19.
    Selvi, S. S. D., Vivek, S. S., & Rangan, C. P. (2010). Security weaknesses in two certificateless signcryption schemes. IACR Cryptology ePrint Archive, 2010, 92–95.Google Scholar
  20. 20.
    Zhou, C., Zhou, W., & Dong, X. (2014). Provable certificateless generalized signcryption scheme. Designs, Codes and Cryptography, 71(2), 331–346.MathSciNetCrossRefMATHGoogle Scholar
  21. 21.
    Liu, Z., Hu, Y., Zhang, X., et al. (2010). Certificateless signcryption scheme in the standard model. Information Sciences, 180(3), 452–464.MathSciNetCrossRefMATHGoogle Scholar
  22. 22.
    Boneh, D., & Boyen, X. (2011). Efficient selective identity-based encryption without random oracles. Journal of Cryptology, 24(4), 659–693.MathSciNetCrossRefMATHGoogle Scholar
  23. 23.
    Herranz, J., Ruiz, A., & Sáez, G. (2014). Signcryption schemes with threshold unsigncryption, and applications. Designs, Codes and Cryptography, 70(3), 323–345.MathSciNetCrossRefMATHGoogle Scholar
  24. 24.
    Galbraith, S. D., Paterson, K. G., & Smart, N. P. (2008). Pairings for cryptographers. Discrete Applied Mathematics, 156(16), 3113–3121.MathSciNetCrossRefMATHGoogle Scholar
  25. 25.
    Granger, R., & Smart, N. P. (2006) On computing products of pairings. IACR Cryptology ePrint Archive, 2006, 172–183.Google Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  1. 1.Department of Information EngineeringEast China Jiaotong UniversityNanchangChina

Personalised recommendations