JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2022, Vol. 57 ›› Issue (9): 15-24.doi: 10.6040/j.issn.1671-9352.0.2021.688

Previous Articles     Next Articles

Security analysis and improvement of a certificateless signcryption scheme

YANG Xiao-dong*, LI Mei-juan, WANG Zhi-song, CHEN Ai-jia, LI Kai-bin   

  1. College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, Gansu, China
  • Published:2022-09-15

Abstract: An improved certificateless signcryption scheme is proposed. It is proved that the new scheme meets the confidentiality and unforgeability in the random oracle model. Compared with similar schemes, the new scheme has higher security and lower computational overhead.

Key words: certificateless signcryption, forgery attack, unforgeability, without bilinear pairing

CLC Number: 

  • TP309
[1] ZHENG Yuliang. Digital signcryption or how to achieve cost(signature & encryption)≪ cost(signature)+cost(encryption)[C] //Proc of the 17th Annual International Cryptology Conference. California: Springer-Verlag, 1997: 165-179.
[2] Al-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C] //International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2003: 452-473.
[3] BARBOSA M, FARSHIM P. Certificateless signcryption[C] //Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2008: 369-372.
[4] 刘文浩, 许春香. 无双线性配对的无证书签密方案[J]. 软件学报, 2011, 22(8):1918-1926. LIU Wenhao, XU Chunxiang. Certificateless signcryption scheme without bilinear pairing[J]. Journal of Software, 2011, 22(8):1918-1926.
[5] 何德彪. 无证书签密机制的安全性分析[J]. 软件学报, 2013, 24(3):618-622. HE Debiao. Security analysis of a certificateless signcryption scheme[J]. Journal of Software, 2013, 24(3):618-622.
[6] 周彦伟, 杨波, 王青龙. 安全的无双线性映射的无证书签密机制[J]. 软件学报, 2017, 28(10):2757-2768. ZHOU Yanwei, YANG Bo, WANG Qinglong. Secure certificateless signcryption scheme without bilinear pairing[J]. Journal of Software, 2017, 28(10):2757-2768.
[7] 王翔, 祁正华, 黄海. 不使用双线性对的无证书签密方案[J]. 计算机技术与发展, 2017, 27(7):106-110. WANG Xiang, QI Zhenghua, HUANG Hai. A certificateless signcryption scheme without bilinear pairing[J]. Computer Technology and Development, 2017, 27(7):106-110.
[8] YU Huifang, YANG Bo. Pairing-free and secure certificateless signcryption scheme[J]. The Computer Journal, 2017, 60(8):1187-1196.
[9] 秦艳琳, 吴晓平, 胡卫. 抗密钥泄露的无证书签密方案[J]. 通信学报, 2017, 38(S2):43-50. QIN Yanlin, WU Xiaoping, HU Wei. Leakage-resilient certificateless signcryption scheme[J]. Journal on Communications, 2017, 38(S2):43-50.
[10] 张永洁, 张玉磊, 王彩芬. 具有内部安全性的常数对无证书聚合签密方案[J]. 电子与信息学报, 2018, 40(2):500-508. ZHANG Yongjie, ZHANG Yulei, WANG Caifen. Certificateless aggregate signcryption scheme with internal security and const pairings[J]. Journal of Electronics & Information Technology, 2018, 40(2):500-508.
[11] ZHOU Caixue. Certificateless signcryption scheme without random oracles[J]. Chinese Journal of Electronics, 2018, 27(5):1002-1008.
[12] RASTEGARI Parvin, SUSILO Willy, DAKHLALIAN Mohammad. Efficient certificateless signcryption in the standard model: revisiting Luo and Wans scheme from wireless personal communications[J]. The Computer Journal, 2019, 62(8):1178-1193.
[13] 朱辉, 李晖, 王育民. 不使用双线性对的无证书签密方案[J]. 计算机研究与发展, 2010, 47(9):1587-1594. ZHU Hui, LI Hui, WANG Yumin. Certificateless signcryption scheme without pairing[J]. Journal of Computer Research and Development, 2010, 47(9):1587-1594.
[14] 周彦伟, 杨波, 张文政. 不使用双线性映射的无证书签密方案的安全性分析及改进[J]. 计算机学报, 2016, 39(6):1257-1266. ZHOU Yanwei, YANG Bo, ZHANG Wenzheng. Security analysis and improvement of certificateless signcryption scheme without bilinear pairing[J]. Chinese Journal of Computers, 2016, 39(6):1257-1266.
[15] 岳泽轮, 王栋, 毛江龙. 改进的不使用双线性对无证书签密方案[J]. 山东大学学报(理学版), 2020, 55(3):51-57,69. YUE Zelun, WANG Dong, MAO Jianglong. Improved certificateless signcryption scheme without bilinear pairing[J]. Journal of Shandong University(Natural Science), 2020, 55(3):51-57,69.
[16] 张振超, 刘亚丽, 殷新春, 等. 无证书签名方案的分析及改进[J]. 密码学报, 2020, 7(3):389-403. ZHANG Zhenchao, LIU Yali, YIN Xinchun, et al. Analysis and improvement of certificateless signature schemes[J]. Journal of Cryptologic Research, 2020, 7(3):389-403.
[17] MA Mimi, FAN Shuqin, FENG Dengguo. Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine[J]. Journal of Information Security and Applications, 2020, 55:102652.
[18] 李发根, 吴威峰. 基于配对的密码学[M]. 北京: 科学出版社, 2014. LI Fagen, WU Weifeng. Pairing based cryptography[M]. Beijing: Science Press, 2014.
[1] . [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2020, 55(3): 51-57.
[2] NONG Qiang, HUANG Zhen-jie, HUANG Ru-fen. Improvement of a certificateless aggregate signature scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(11): 52-59.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] YANG Jun. Characterization and structural control of metalbased nanomaterials[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2013, 48(1): 1 -22 .
[2] HE Hai-lun, CHEN Xiu-lan* . Circular dichroism detection of the effects of denaturants and buffers on the conformation of cold-adapted protease MCP-01 and  mesophilic protease BP01[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2013, 48(1): 23 -29 .
[3] ZHAO Jun1, ZHAO Jing2, FAN Ting-jun1*, YUAN Wen-peng1,3, ZHANG Zheng1, CONG Ri-shan1. Purification and anti-tumor activity examination of water-soluble asterosaponin from Asterias rollestoni Bell[J]. J4, 2013, 48(1): 30 -35 .
[4] SUN Xiao-ting1, JIN Lan2*. Application of DOSY in oligosaccharide mixture analysis[J]. J4, 2013, 48(1): 43 -45 .
[5] LUO Si-te, LU Li-qian, CUI Ruo-fei, ZHOU Wei-wei, LI Zeng-yong*. Monte-Carlo simulation of photons transmission at alcohol wavelength in  skin tissue and design of fiber optic probe[J]. J4, 2013, 48(1): 46 -50 .
[6] YANG Lun, XU Zheng-gang, WANG Hui*, CHEN Qi-mei, CHEN Wei, HU Yan-xia, SHI Yuan, ZHU Hong-lei, ZENG Yong-qing*. Silence of PID1 gene expression using RNA interference in C2C12 cell line[J]. J4, 2013, 48(1): 36 -42 .
[7] MAO Ai-qin1,2, YANG Ming-jun2, 3, YU Hai-yun2, ZHANG Pin1, PAN Ren-ming1*. Study on thermal decomposition mechanism of  pentafluoroethane fire extinguishing agent[J]. J4, 2013, 48(1): 51 -55 .
[8] YANG Ying, JIANG Long*, SUO Xin-li. Choquet integral representation of premium functional and related properties on capacity space[J]. J4, 2013, 48(1): 78 -82 .
[9] LI Yong-ming1, DING Li-wang2. The r-th moment consistency of estimators for a semi-parametric regression model for positively associated errors[J]. J4, 2013, 48(1): 83 -88 .
[10] DONG Wei-wei. A new method of DEA efficiency ranking for decision making units with independent subsystems[J]. J4, 2013, 48(1): 89 -92 .