A secure encryption scheme based on certificateless proxy signature

被引:0
|
作者
Sudharani K. [1 ]
Sakthivel P.N.K. [2 ]
机构
[1] Bharathiar University, Coimbatore, Tamilnadu
[2] Nehru College of Engineering and Research Centre, Thrissur, Kerala
关键词
Access control; Certificateless public key cryptography; CL-PKC; Cloud computing; Data confidentiality malicious KGC attack; Proxy signature; Public key replacement attack;
D O I
10.1504/IJCC.2018.091683
中图分类号
学科分类号
摘要
Certificateless public key cryptography (CL-PKC) scheme is introduced for solving the key escrow problems in the identity-based cryptography and eliminate the use of security certificates. By introducing the proxy signature concept in the certificateless cryptography scheme, this certificateless proxy signature (CLPS) scheme has attracted the attention of more researchers. However, this scheme suffers due to the security issues and fails to achieve the unforgeability against the attacks. To overcome the security issues in the existing cryptographic scheme, this paper proposes an encryption scheme based on the certificateless proxy signature for sharing the sensitive data in the public cloud in a secure manner. The proposed scheme is proven to be unforgeable against the message attacks. When compared with the existing CLPS scheme without random oracles, the proposed scheme offers better data security while ensuring better data sharing performance. From the experimental results, it was noticed that the proposed scheme requires minimum encryption and decryption time than that of existing scheme. Copyright © 2018 Inderscience Enterprises Ltd.
引用
收藏
页码:40 / 64
页数:24
相关论文
共 50 条
  • [41] On the security of a certificateless proxy signature scheme in the standard model
    Zhou, Caixue
    Dong, Xiwei
    Wang, Lihua
    Li, Tao
    International Journal of Network Security, 2019, 21 (04) : 576 - 581
  • [42] A Certificateless Proxy Re-encryption Scheme for Cloud-Based Blockchain
    Eltayieb, Nabeil
    Sun, Liang
    Wang, Ke
    Li, Fagen
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 293 - 307
  • [43] Certificateless Threshold-Based Conditional Proxy Re-Encryption Scheme
    Li Z.
    Zhang L.
    Zhao H.
    Wei Z.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2023, 46 (01): : 44 - 49+83
  • [44] Cryptoanalysis of Certificateless Partially Blind Signature and Proxy Blind Signature Scheme
    Zhang, Jianhong
    Chen, Hua
    Geng, Qin
    PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOLS 1-9, 2009, : 1491 - 1495
  • [45] A cloud data deduplication scheme based on certificateless proxy re-encryption
    Zheng, Xiaoyu
    Zhou, Yuyang
    Ye, Yalan
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 102
  • [46] Secure threshold proxy signature scheme
    Department of Computer Science, Jinan University, Guangzhou 510632, China
    不详
    Dianzi Yu Xinxi Xuebao, 2006, 7 (1308-1311):
  • [47] Provably secure certificateless deniable authenticated encryption scheme
    Kar, Jayaprakash
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [48] A SECURE THRESHOLD PROXY SIGNATURE SCHEME
    Xu, Feng
    Zhou, Wenhuan
    Liu, Xuan
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2012, 18 (06): : 617 - 625
  • [49] Provably secure certificateless encryption scheme in the standard model
    Deng, Lunzhi
    Xia, Tian
    He, Xiuru
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (06): : 2534 - 2553
  • [50] A Secure Certificateless Signature Scheme for Space-Based Internet of Things
    Liu, Tongwei
    Peng, Wei
    Zhu, Kai
    Zhao, Baokang
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022