Universally Verifiable Certificateless Signcryption Scheme for MANET

The mobile ad hoc network (MANET) is a collection of wireless mobile nodes that communicate with one another through a standard transmission medium such as Wi-Fi, cellular, or satellite communication. However, their basic characteristics make them vulnerable against numerous attacks accordingly raising the need of security. In this paper, we propose a certificateless signcryption scheme based on the difficulty of solving the Diffie–Hellman problem. The simulation result proves that the scheme is secure against active and passive attacks using AVISPA (Automated Validation of Internet Security Protocols and Applications) tool.

[1]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[2]  Baocang Wang,et al.  Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks , 2013, Secur. Commun. Networks.

[3]  Xavier Boyen,et al.  Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.

[4]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[5]  Lung-Chung Li,et al.  Securing Cluster-Based Ad Hoc Networks with Distributed Authorities , 2010, IEEE Transactions on Wireless Communications.

[6]  He De Security Analysis of a Certificateless Signcryption Scheme , 2013 .

[7]  Yuguang Fang,et al.  Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.

[8]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[9]  Manuel Barbosa,et al.  Certificateless signcryption , 2008, ASIACCS '08.

[10]  Pramod Kumar Soni,et al.  A Survey of Mobile Ad Hoc Network Attacks , 2013 .

[11]  Fuyou Miao,et al.  Fully Self-organized Key Management Scheme in MANET and Its Applications , 2013 .

[12]  Zhenfei Zhang,et al.  Mobile ad-hoc network key management with certificateless cryptography , 2008, 2008 2nd International Conference on Signal Processing and Communication Systems.

[13]  Zezhong Zhang,et al.  Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing , 2014, Frontiers of Computer Science.

[14]  Imrich Chlamtac,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.

[15]  Zhang Zhang,et al.  Efficient and provably secure certificateless signcryption from bilinear maps , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[16]  Chun-Xiang Xu,et al.  Certificateless Signcryption Scheme Without Bilinear Pairing: Certificateless Signcryption Scheme Without Bilinear Pairing , 2011 .

[17]  Sangjin Kim,et al.  ID-based key management scheme using threshold decryption for OPMD environment , 2012, 2012 IEEE International Conference on Consumer Electronics (ICCE).

[18]  De-Biao He Security Analysis of a Certificateless Signcryption Scheme: Security Analysis of a Certificateless Signcryption Scheme , 2014 .

[19]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[20]  Liqun Chen,et al.  Improved Identity-Based Signcryption , 2005, Public Key Cryptography.

[21]  Wang Bin (t,n) Threshold Signature Scheme Without a Trusted Party , 2003 .

[22]  Shi Lin,et al.  A New Certificateless Signcryption Scheme Without Bilinear Pairing , 2018, 2018 13th International Conference on Computer Science & Education (ICCSE).

[23]  Luca Viganò,et al.  Automated Security Protocol Analysis With the AVISPA Tool , 2006, MFPS.