Construction of Certificateless Proxy Signcryption Scheme From CMGs

As a cryptography primitive for secure data transmission, certificateless proxy signcryption (CLPS) allows an original signcrypter to entrust his signing authority to a proxy signcrypter for signing specified message on his behalf. In this paper, we combine CLPS with cyclic multiplication groups (CMGs) to construct a new certificateless proxy signcryption scheme from CMGs (CMGs-CLPSS). CMGs-CLPSS will receive significant attention because it simplifies the traditional public key cryptosystem (PKC) and solves the key escrow issue suffered by identity-based public key cryptosystem (IB-PKC). In CMGs-CLPSS, an encrypted message can only be decrypted by a designated receiver who is also responsible for verifying the message; moreover, if a later dispute over repudiation occurs, the designated receiver can readily announce ordinary CLPS for public verification without any extra computation effort. CMGs-CLPSS is proved to have the indistinguishability under adaptive chosen-ciphertext attacks (IND-CCA2 security) and existential unforgeability under adaptive chosen-message attacks (UF-CMA security) in the random oracle model. CMGs-CLPSS outperforms the existing schemes on the basis of computational complexity and is suitable for applications in digital contract signing and online proxy auction, and so on.

[1]  Robert H. Deng,et al.  Cryptanalysis of a certificateless signcryption scheme in the standard model , 2011, Inf. Sci..

[2]  Chun-I Fan,et al.  Provably secure randomized blind signature scheme based on bilinear pairing , 2010, Comput. Math. Appl..

[3]  Jianmin Li,et al.  Identity-Based Proxy Signcryption Protocol with Universal Composability , 2018, Secur. Commun. Networks.

[4]  Caixue Zhou,et al.  Identity Based Generalized Proxy Signcryption Scheme , 2016, Inf. Technol. Control..

[5]  Yining Liu,et al.  E-Voting Scheme Using Secret Sharing and K-Anonymity , 2016, BWCCA.

[6]  Fagen Li,et al.  Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings , 2015, Comput. J..

[7]  Yu Hui,et al.  Identity-Based Hybrid Signcryption Scheme Using ECC , 2015 .

[8]  Han Wen Certificateless Signcryption Scheme with Proxy Unsigncryption , 2011 .

[9]  Zhe Xia,et al.  Privacy-preserving raw data collection without a trusted authority for IoT , 2019, Comput. Networks.

[10]  Xie Yong,et al.  ElGamal Broadcasting Multi-Signcryption Protocol with UC Security , 2019 .

[11]  Manuel Barbosa,et al.  Certificateless signcryption , 2008, ASIACCS '08.

[12]  Bo Yang,et al.  Low-computation certificateless hybrid signcryption scheme , 2017, Frontiers of Information Technology & Electronic Engineering.

[13]  Yi Mu,et al.  On the security of a certificateless signcryption scheme , 2013, 2014 IEEE Workshop on Electronics, Computer and Applications.

[14]  Fagen Li,et al.  An efficient signcryption for data access control in cloud computing , 2017, Computing.

[15]  Fagen Li,et al.  Secure identity-based signcryption in the standard model , 2013, Math. Comput. Model..

[16]  Jussipekka Leiwo,et al.  An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption , 1998 .

[17]  Yang Ming,et al.  Proxy signcryption scheme in the standard model , 2015, Secur. Commun. Networks.

[18]  Yupu Hu,et al.  Certificateless signcryption scheme in the standard model , 2010, Inf. Sci..

[19]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.