1. Department of Secrecy, Archive and Screen, Logistics University of Peoples Armed Police Force, Tianjin 300300, China
• Published:2020-03-27

Abstract: Signcryption can finish encryption and signature in one logical step. Compared with traditional encryption scheme, signcryption is more efficient. Compared with the cryptographic schemes using bilinear pairings, the cryptographic schemes without bilinear pairings have a great improvement in computational efficiency. An improved certificateless signcryption scheme without bilinear pairings is proposed. The security of the scheme is proved under the random oracle model, and the scheme is analyzed by experiments.

CLC Number:

• TP309
 [1] ZHENG Yuliang. Digital signcryption or how to achieve cost(signature & encryption)≪cost(signature)+cost(encryption)[C] // Proc of the 17th Annual International Cryptology Conference. California: Springer-Verlag, 1997: 165-179.[2] SHAMIR A. Identity-based cryptosystems and signature schemes[C] // Workshop on the Theory and Application of Cryptographic Techniques. Berlin: Springer, 1984: 47-53.[3] Al-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C] // International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2003: 452-473.[4] 张福泰, 孙银霞, 张磊,等. 无证书公钥密码体制研究[J]. 软件学报, 2011, 22(6):1316-1332. ZHANG Futai, SUN Yinxia, ZHANG Lei, et al. Research on certificateless public key cryptography[J]. Journal of Software, 2011, 22(6):1316-1332.[5] 侯红霞,张雪锋,董晓丽. 改进的无证书聚合签名方案[J]. 山东大学学报(理学版), 2013, 48(9):29-34. HOU Hongxia, ZHANG Xuefeng, DONG Xiaoli. Improved certificateless aggregate signature scheme[J]. Journal of Shandong University(Natural Science), 2013, 48(9):29-34.[6] 杨珺涵, 曹天杰. 标准模型下基于无证书密钥封装的口令认证密钥交换协议[J]. 山东大学学报(工学版), 2013, 43(2):11-17. YANG Junhan, CAO Tianjie. Password-authenticated key exchange protocol based on certificateless key encapsulation in the standard model[J]. Journal of Shandong University(Engineering Science), 2013, 43(2):11-17.[7] 杜瑞颖, 刘亚斌, 刘建东, 等. 无证书密钥隔离签名方案[J]. 山东大学学报(理学版), 2014, 49(9):24-28. DU Ruiying, LIU Yabin, LIU Jiandong, et al. A certificateless key-insulated signature scheme[J]. Journal of Shandong University(Natural Science), 2014, 49(9):24-28.[8] 樊爱宛, 夏栋梁, 杨照峰. 两种无证书聚合签名方案的安全性分析及改进[J]. 山东大学学报(理学版), 2015, 50(9):42-48. FAN Aiwan, XIA Dongliang, YANG Zhaofeng. Security analysis and improvement of two certificateless aggregate signature schemes[J]. Journal of Shandong University(Natural Science), 2015, 50(9):42-48.[9] BARBOSA M, FARSHIM P. Certificateless signcryption[C] // Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2008: 369-372.[10] WU Chenhuang, CHEN Zhixiong. A new efficient certificateless signcryption scheme[C] // Proceedings of the Information Science and Engineering, International Symposium on IEEE, New York: IEEE, 2008: 661-664. [11] LI F G, SHIRASE M, TAKAGI T. Certificateless hybrid signcryption[M] // Information Security Practice and Experience. Berlin: Springer, 2009: 112-123.[12] BARRETO P S L M, DEUSAJUTE A M, DE E, et al. Toward efficient certificateless signcryption from(and without)bilinear pairings[C] // VIII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais. New York: IEEE, 2008.[13] 朱辉, 李晖, 王育民. 不使用双线性对的无证书签密方案[J]. 计算机研究与发展, 2010, 47(9):1587-1594. ZHU Hui, LI Hui, WANG Yunming. Certificateless signcryption scheme without pairing[J]. Journal of Computer Research and Development, 2010, 47(9):1587-1594.[14] SELVI S S D, VIVEK S S, RANGAN C P. Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing[M] // Information Security and Cryptology. Berlin: Springer, 2010: 75-92.[15] SHI W B, KUMAR N, GONG P, et al. Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing[J]. Frontiers of Computer Science, 2014, 8(4):656-666.[16] 赵振国. 无证书签密机制的安全性分析与改进[J]. 通信学报, 2015, 36(3):125-130. ZHAO Zhenguo. Security analysis and improvement of a certificateless signcryption scheme[J]. Journal on Communications, 2015, 36(3):125-130.[17] 周彦伟, 杨波, 张文政. 不使用双线性映射的无证书签密方案的安全性分析及改进[J]. 计算机学报, 2016, 39(6):1257-1266. ZHOU Yanwei, YANG Bo, ZHANG Wenzheng. Security analysis and improvement of certificateless signcryption scheme without bilinear pairing[J]. Chinese Journal of Computers, 2016, 39(6):1257-1266.
 [1] ZUO Li-ming, CHEN Lan-lan, ZHOU Qing. A certificate-based short signature scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2019, 54(1): 79-87. [2] FAN Ai-wan, XIA Dong-liang, YANG Zhao-feng. Security analysis and improvement of two certificateless aggregate signature schemes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(09): 42-48. [3] YAN Zhao-xiang. Chosen cipher-text security proof of ZS encryption scheme [J]. J4, 2010, 45(11): 115-121.
Viewed
Full text

Abstract

Cited

Shared
Discussed