A Secure Encryption Scheme Based on Certificateless Proxy Signature

  • K. Sudharani
  • P. N. K. Sakthivel
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 645)


Certificateless public key cryptography (CL-PKC) scheme is introduced for solving the key escrow problems in the identity-based cryptography and eliminating the use of security certificates. By introducing the proxy signature concept in the certificateless cryptography scheme, this certificateless proxy signature (CLPS) scheme has attracted the attention of more researchers. However, this scheme suffers due to the security issues and fails to achieve the unforgeability against the attacks. To overcome the security issues in the existing cryptographic schemes, this paper proposes an encryption scheme based on the certificateless proxy signature for sharing the sensitive data in the public cloud in a secure manner. The proposed scheme is proven to be unforgeable against the message attacks. When compared with the existing CLPS scheme without random oracles, the proposed scheme offers better data security while ensuring better data sharing performance. From the experimental results, it is noticed that the proposed scheme requires minimum encryption time and decryption time than the existing schemes.


Access control Cloud computing Certificateless public key cryptography (CL-PKC) Data confidentiality Malicious KGC attack Proxy signature Public key replacement attack 


  1. 1.
    Xu, L., Wu, X., Zhang, X.: CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 87–88 (2012)Google Scholar
  2. 2.
    Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: delegation of the power to sign messages. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 79, 1338–1354 (1996)Google Scholar
  3. 3.
    Wang, L.-L., Chen, K.-F., Mao, X.-P., Wang, Y.-T.: Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing. J. Shanghai Jiaotong Univ. (Sci.) 19, 398–405 (2014)CrossRefGoogle Scholar
  4. 4.
    Qin Z, Wu S, Xiong H.: Strongly secure and cost-effective certificateless proxy re-encryption scheme for data sharing in cloud computing. In: International Conference on Big Data Computing and Communications, pp. 205–216 (2015)Google Scholar
  5. 5.
    Srinivasan, A., Rangan, C.P.: (2015) Certificateless proxy re-encryption without pairing: revisited. In: Proceedings of the 3rd International Workshop on Security in Cloud Computing, pp. 41–52Google Scholar
  6. 6.
    Seo, S.-H., Nabeel, M., Ding, X., Bertino, E.: An efficient certificateless encryption for secure data sharing in public clouds. IEEE Trans. Knowl. Data Eng. 26, 2107–2119 (2014)CrossRefGoogle Scholar
  7. 7.
    Xu, P., Xu, J., Wang, W., Jin, H., Susilo, W., Zou, D.: Generally hybrid proxy re-encryption: a secure data sharing among cryptographic clouds. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 913–918 (2016)Google Scholar
  8. 8.
    Lu, Y., Li, J.: A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds. Future Gener Comput Syst 62, 140–147 (2016)CrossRefGoogle Scholar
  9. 9.
    Sur, C., Park, Y., Shin, S.U., Rhee, K.H., Seo, C.: Certificate-based proxy re-encryption for public cloud storage. In: Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 159–166 (2013)Google Scholar
  10. 10.
    Lu, Y.: Efficient Certificate-Based Proxy Re-encryption Scheme for Data Sharing in Public Clouds (2015)Google Scholar
  11. 11.
    Jiang, W.: Parallel certificateless proxy reencryption scheme applicable for cloud storage. J. Comput. Theor. Nanosci. 13, 4515–4520 (2016)CrossRefGoogle Scholar
  12. 12.
    Kumar, A., Mishra, S., Dubey, P., Kumar, N.: Secure data sharing with data integrity in public clouds using mediated certificate-less encryption. In Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing, pp. 501–510 (2016)Google Scholar
  13. 13.
    Eslami, Z., Pakniat, N.: A certificateless proxy signature scheme secure in standard model. In Proceedings of International Conference on Latest Computational Technologies-ICLCT, pp. 81–84 (2012)Google Scholar
  14. 14.
    Lu, Y., Li, J.: Provably secure certificateless proxy signature scheme in the standard model. Theore. Comput. Sci. (2016)Google Scholar
  15. 15.
    Tsai, J.-L.: A new efficient certificateless short signature scheme using bilinear pairings. IEEE Syst. J. (2015)Google Scholar
  16. 16.
    Choi, K.Y., Park, J.H., Lee, D.H.: A new provably secure certificateless short signature scheme. Comput. Math Appl. 61, 1760–1768 (2011)MathSciNetCrossRefzbMATHGoogle Scholar
  17. 17.
    Chun-Ifan, R.-H.H., Ho, P.-H.: Truly non-repudiation certificateless short signature scheme from bilinear pairings. J. Inf. Sci. Eng. 27, 969–982 (2011)Google Scholar
  18. 18.
    Tso, R., Huang, X., Susilo, W.: Strongly secure certificateless short signatures. J. Syst. Softw. 85, 1409–1417 (2012)CrossRefGoogle Scholar
  19. 19.
    Chen, Y.-C., Horng, G., Liu, C.-L.: Strong non-repudiation based on certificateless short signatures. IET Inf. Secur. 7, 253–263 (2013)CrossRefGoogle Scholar
  20. 20.
    He, D., Huang, B., Chen, J.: New certificateless short signature scheme. IET Inf. Secur. 7, 113–117 (2013)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Bharathiar UniversityCoimbatoreIndia
  2. 2.Nehru College of Engineering and Research CentreThrissurIndia

Personalised recommendations