A secure encryption scheme based on certificateless proxy signature

被引:0
|
作者
Sudharani K. [1 ]
Sakthivel P.N.K. [2 ]
机构
[1] Bharathiar University, Coimbatore, Tamilnadu
[2] Nehru College of Engineering and Research Centre, Thrissur, Kerala
关键词
Access control; Certificateless public key cryptography; CL-PKC; Cloud computing; Data confidentiality malicious KGC attack; Proxy signature; Public key replacement attack;
D O I
10.1504/IJCC.2018.091683
中图分类号
学科分类号
摘要
Certificateless public key cryptography (CL-PKC) scheme is introduced for solving the key escrow problems in the identity-based cryptography and eliminate the use of security certificates. By introducing the proxy signature concept in the certificateless cryptography scheme, this certificateless proxy signature (CLPS) scheme has attracted the attention of more researchers. However, this scheme suffers due to the security issues and fails to achieve the unforgeability against the attacks. To overcome the security issues in the existing cryptographic scheme, this paper proposes an encryption scheme based on the certificateless proxy signature for sharing the sensitive data in the public cloud in a secure manner. The proposed scheme is proven to be unforgeable against the message attacks. When compared with the existing CLPS scheme without random oracles, the proposed scheme offers better data security while ensuring better data sharing performance. From the experimental results, it was noticed that the proposed scheme requires minimum encryption and decryption time than that of existing scheme. Copyright © 2018 Inderscience Enterprises Ltd.
引用
收藏
页码:40 / 64
页数:24
相关论文
共 50 条
  • [31] Secure Certificateless Proxy Re-encryption Without Pairing
    Kuchta, Veronika
    Sharma, Gaurav
    Sahu, Rajeev Anand
    Bhatia, Tarunpreet
    Markowitch, Olivier
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 85 - 101
  • [32] An efficient and secure certificateless aggregate signature scheme
    Xu, Ran
    Zhou, Yanwei
    Yang, Qiliang
    Yang, Kunwei
    Han, Yu
    Yang, Bo
    Xia, Zhe
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 147
  • [33] A Provably Secure Certificateless Blind Signature Scheme
    Yang, Xiaoyuan
    Liang, Zhongyin
    Wei, Ping
    Shen, Junwei
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 643 - 646
  • [34] A Secure Proxy Blind Signature Scheme Based on ECDLP
    Hu, Lanlan
    Zheng, Kangfeng
    Hu, Zhengming
    Yang, Yixian
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 454 - 457
  • [35] An efficient certificateless proxy signature scheme without pairing
    He, Debiao
    Chen, Yitao
    Chen, Jianhua
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (9-10) : 2510 - 2518
  • [36] Efficient certificateless proxy signature scheme with provable security
    Seo, Seung-Hyun
    Choi, Kyu Young
    Hwang, Jung Yeon
    Kim, Seungjoo
    INFORMATION SCIENCES, 2012, 188 : 322 - 337
  • [37] A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks
    Yang, Wenjie
    Weng, Jian
    Huang, Xinyi
    Yang, Anjia
    COMPUTER JOURNAL, 2020, 63 (08): : 1139 - 1147
  • [38] On the Security of a Certificateless Proxy Signature Scheme with Message Recovery
    Shi, Wenbo
    He, Debiao
    Gong, Peng
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [39] A certificateless proxy ring signature scheme with provable security
    Xiong, Hu
    Qin, Zhiguang
    Li, Fagen
    International Journal of Network Security, 2011, 12 (02) : 92 - 106
  • [40] Cryptanalysis and improvement of a certificateless strong proxy signature scheme
    Hu, Guo-Zheng
    Han, Lan-Sheng
    Wang, Zhan-Qing
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2011, 34 (05): : 115 - 118