Generic Construction of Certificateless Signcryption Scheme

被引:0
|
作者
Kar, Jayaprakash [1 ]
Naik, Kshirasagar [2 ]
机构
[1] LNM Inst Informat Technol, Dept Comp Sci & Engn, Jaipur, Rajasthan, India
[2] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
来源
INFORMATION SYSTEMS SECURITY | 2016年 / 10063卷
关键词
Provable security; Public key infrastructure; Insider security; Chosen message attack; EFFICIENT;
D O I
10.1007/978-3-319-49806-5_28
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Confidentiality and message authentication are the most important security goals that can be achieved simultaneously by Signcryption scheme. It is a cryptographic technique that performs both the functions of digital signature and public key encryption in a single logical step significantly at a lower cost than that of conventional method of signature-then-encryption. The paper proposes an efficient Certificateless Signcryption Scheme (CLSC) in random oracle model on bilinear mapping. It is provably secure under the assumptions of intractability of k-CAA, Inv-CDH, q-BDHI and CDH problems.
引用
收藏
页码:489 / 498
页数:10
相关论文
共 50 条
  • [1] Construction of Certificateless Proxy Signcryption Scheme From CMGs
    Yu, Huifang
    Wang, Zhicang
    IEEE ACCESS, 2019, 7 : 141910 - 141919
  • [2] Efficient Certificateless Signcryption Scheme
    Yu, Gang
    Yang, Hongzhi
    Fan, Shuqin
    YongShen
    Han, Wenbao
    THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 55 - 59
  • [3] On security of a certificateless signcryption scheme
    Miao, Songqin
    Zhang, Futai
    Li, Sujuan
    Mu, Yi
    INFORMATION SCIENCES, 2013, 232 : 475 - 481
  • [4] An Improved Certificateless Signcryption Scheme
    Rastegari, Parvin
    Berenjkoub, Mehdi
    2016 13TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2016, : 106 - 111
  • [5] On the Security of a Certificateless Signcryption Scheme
    Huang, Yueying
    Zhang, Jingang
    Chen, Houyan
    2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 664 - 667
  • [6] Provable certificateless generalized signcryption scheme
    Zhou, Caixue
    Zhou, Wan
    Dong, Xiwei
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 71 (02) : 331 - 346
  • [7] An Efficient Biometric Certificateless Signcryption Scheme
    Luo, Ming
    Huang, Donghua
    Hu, Jun
    JOURNAL OF COMPUTERS, 2013, 8 (07) : 1853 - 1860
  • [8] A New Efficient Certificateless Signcryption Scheme
    Wu, Chen-huang
    Chen, Zhi-xiong
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 661 - 664
  • [9] Cryptanalysis of a Certificateless Ring Signcryption Scheme
    Du, Hongzhen
    Wen, Qiaoyan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 329 - 336
  • [10] An Efficient Certificateless Generalized Signcryption Scheme
    Zhang, Bo
    Jia, Zhongtian
    Zhao, Chuan
    SECURITY AND COMMUNICATION NETWORKS, 2018,