On security of a Certificateless Hybrid Signcryption Scheme

AbstractCertificateless hybrid signcryption is a newly cryptosystem that plays a great role in some storage-constrained networks when confidentiality and authenticity are needed simultaneously. Now considering almost all certificateless signcryption schemes that have been proposed in the literature cannot effectively against the public-key-replacement attacks. In this paper, we proposed a hybrid signcryption scheme in the certificateless setting to fill this security gaps, and its security has been verified to achieve the confidentiality and unforgeability in random oracle model. Moreover, performance analysis shows the proposed scheme is efficient and practical.

[1]  Nigel P. Smart,et al.  On Computing Products of Pairings , 2006, IACR Cryptol. ePrint Arch..

[2]  Dan Boneh,et al.  Efficient Selective Identity-Based Encryption Without Random Oracles , 2011, Journal of Cryptology.

[3]  Manuel Barbosa,et al.  Certificateless signcryption , 2008, ASIACCS '08.

[4]  Yvo Desmedt,et al.  A New Paradigm of Hybrid Encryption Scheme , 2004, CRYPTO.

[5]  Kenneth G. Paterson,et al.  Pairings for Cryptographers , 2008, IACR Cryptol. ePrint Arch..

[6]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[7]  Marko Hölbl,et al.  An improved two-party identity-based authenticated key agreement protocol using pairings , 2012, J. Comput. Syst. Sci..

[8]  Pooya Farshim,et al.  Generic Constructions of Identity-Based and Certificateless KEMs , 2008, Journal of Cryptology.

[9]  Ingrid Verbauwhede,et al.  Teaching HW/SW Co-Design With a Public Key Cryptography Application , 2013, IEEE Transactions on Education.

[10]  Yupu Hu,et al.  Certificateless signcryption scheme in the standard model , 2010, Inf. Sci..

[11]  K. C. Reddy,et al.  Signcryption scheme for Identity-based Cryptosystems , 2003, IACR Cryptol. ePrint Arch..

[12]  Germán Sáez,et al.  Signcryption schemes with threshold unsigncryption, and applications , 2014, Des. Codes Cryptogr..

[13]  Caixue Zhou,et al.  Provable certificateless generalized signcryption scheme , 2014, Des. Codes Cryptogr..

[14]  Mohsen Guizani,et al.  An enhanced public key infrastructure to secure smart grid wireless communication networks , 2014, IEEE Network.

[15]  C. Pandu Rangan,et al.  Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing , 2009, Inscrypt.

[16]  Robert H. Deng,et al.  Cryptanalysis of a certificateless signcryption scheme in the standard model , 2011, Inf. Sci..

[17]  Ming Zhu,et al.  Authentication Protocol using MYK-NTRUSign Signature Algorithm in Wireless Network Environment , 2014, J. Networks.

[18]  Yiliang Han,et al.  BPGSC: Bilinear Paring Based Genearlized SignCryption Scheme , 2009, 2009 Eighth International Conference on Grid and Cooperative Computing.

[19]  Liqun Chen,et al.  An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction , 2006, IACR Cryptol. ePrint Arch..

[20]  C. Pandu Rangan,et al.  On the Security of Certificateless Signcryption Schemes , 2009 .

[21]  C. Pandu Rangan,et al.  Security Weaknesses in Two Certificateless Signcryption Schemes , 2010, IACR Cryptol. ePrint Arch..

[22]  Jingang Zhang,et al.  On the security of a certificateless signcryption scheme , 2014 .

[23]  Fagen Li,et al.  Certificateless hybrid signcryption , 2009, Math. Comput. Model..

[24]  John Malone-Lee,et al.  Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..

[25]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[26]  Ronald Cramer,et al.  Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..

[27]  Zhixiong Chen,et al.  A New Efficient Certificateless Signcryption Scheme , 2008, 2008 International Symposium on Information Science and Engineering.

[28]  A. Shamm Identity-based cryptosystems and signature schemes , 1985 .