A secure encryption scheme based on certificateless proxy signature

被引:0
|
作者
Sudharani K. [1 ]
Sakthivel P.N.K. [2 ]
机构
[1] Bharathiar University, Coimbatore, Tamilnadu
[2] Nehru College of Engineering and Research Centre, Thrissur, Kerala
关键词
Access control; Certificateless public key cryptography; CL-PKC; Cloud computing; Data confidentiality malicious KGC attack; Proxy signature; Public key replacement attack;
D O I
10.1504/IJCC.2018.091683
中图分类号
学科分类号
摘要
Certificateless public key cryptography (CL-PKC) scheme is introduced for solving the key escrow problems in the identity-based cryptography and eliminate the use of security certificates. By introducing the proxy signature concept in the certificateless cryptography scheme, this certificateless proxy signature (CLPS) scheme has attracted the attention of more researchers. However, this scheme suffers due to the security issues and fails to achieve the unforgeability against the attacks. To overcome the security issues in the existing cryptographic scheme, this paper proposes an encryption scheme based on the certificateless proxy signature for sharing the sensitive data in the public cloud in a secure manner. The proposed scheme is proven to be unforgeable against the message attacks. When compared with the existing CLPS scheme without random oracles, the proposed scheme offers better data security while ensuring better data sharing performance. From the experimental results, it was noticed that the proposed scheme requires minimum encryption and decryption time than that of existing scheme. Copyright © 2018 Inderscience Enterprises Ltd.
引用
收藏
页码:40 / 64
页数:24
相关论文
共 50 条
  • [1] A PROVABLY SECURE CERTIFICATELESS PROXY SIGNATURE SCHEME
    Chen, Yu-Chi
    Liu, Chao-Liang
    Horng, Gwoboa
    Chen, Kuo-Chang
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (09): : 5557 - 5569
  • [2] Provably Secure Forward Secure Certificateless Proxy Signature Scheme
    Li, Jiguo
    Li, Yanqiong
    Zhang, Yichen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (08): : 1972 - 1988
  • [3] A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
    Xiong, Hu
    Li, Fagen
    Qin, Zhiguang
    INFORMATICA, 2010, 21 (02) : 277 - 294
  • [4] Towards a Secure Certificateless Proxy Re-Encryption Scheme
    Guo, Hui
    Zhang, Zhenfeng
    Zhang, Jiang
    Chen, Cheng
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 330 - 346
  • [5] Provably secure certificateless proxy signature scheme in the standard model
    Lu, Yang
    Li, Jiguo
    THEORETICAL COMPUTER SCIENCE, 2016, 639 : 42 - 59
  • [6] Forward secure certificateless proxy multi-signature scheme
    Gao, Ronghai
    Zeng, Jiwen
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2021, 13 (01) : 1 - 27
  • [7] Provably Secure Certificateless Proxy Signature Scheme in the Standard Model
    Deng, Lunzhi
    Hu, Zhenyu
    Ruan, Yu
    Wang, Tao
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (02): : 279 - 288
  • [8] Efficient Certificateless Proxy Signature Scheme
    Deng, Lunzhi
    Zeng, Jiwen
    Huang, Huawei
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2016, 27 (01) : 85 - 100
  • [9] Certificateless Proxy Blind Signature Scheme
    Yu Meisheng
    Wu Xiaojuan
    Guan Jian
    Yu Haixia
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 177 - 180
  • [10] Certificateless short proxy signature scheme
    Yuan, Y. (ymyuan@xmu.edu.cn), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):