Abstract
Generalized signcryption can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm. It is very suitable for storage-constrained environments. In this paper, we introduce a formal security model for certificateless generalized signcryption schemes secure against the malicious-but-passive key generation center attacks and propose a novel scheme. Our scheme is proved to be IND-CCA2 secure under the GBDH assumption and CDH assumption and existentially unforgeable under the GDH’ assumption and CDH assumption in random oracle model. Furthermore, performance analysis shows the proposed scheme is efficient and practical.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
Shamir A.: Identity-based cryptosystems and signature schemes. In: CRYPTO’84. Lecture Notes in Computer Science, vol. 196, pp. 47–53. Springer, Heidelberg (1984).
Al-Riyami S.S., Paterson K.G.: Certificateless public key cryptography. In: Proceedings of ASIACRYPT 2003. Lecture Notes in Computer Science, vol. 2894, pp. 452–473. Springer, Heidelberg (2003).
Zheng Y.L.: Digital signcryption or how to achieve cost (Signature & Encryption) Cost (Signature) + Cost (Encryption). In: CRYPTO’97. Lecture Notes in Computer Science, vol. 1294, pp. 165–179. Springer, Heidelberg (1997).
Barbosa M., Farshim P.: Certificateless signcryption. In: Proceedings of ASIACCS’2008, pp. 369–372. ACM, New York (2008).
Han Y.L., Yang X.Y., Wei P., et al.: ECGSC: elliptic curve based generalized signcryption. In: The 3rd International Conference on Ubiquitous Intelligence and Computing (UIC-2006). Lecture Notes in Computer Science, vol. 4159, pp. 956–965. Springer, Heidelberg (2006).
Han Y.L.: Generalization of signcryption for resources-constrained environments. Wirel. Commun. Mobile Comput. 7(7), 919–931 (2007)
ANSI X9.62: Public key cryptography for the financial services industry: the Elliptic Curve Digital Signature Algorithm (ECDSA). (1999).
Wang X.A., Yang X.Y., Han Y.L.: Provable secure generalized signcryption. Cryptology ePrint Archive, Report 2007/173. http://eprint.iacr.org (2007).
Lai S., Kushwah P.: ID-based generalized signcryption. Cryptology ePrint Archive, Report 2008/084. http://eprint.iacr.org (2008).
Yu G., Ma X.X., Shen Y. et al.: Provable secure identity based generalized signcryption scheme. Theor. Comput. Sci. 411(40–42), 3614–3624 (2010)
Kushwah P., Lai S.: An efficient identity based generalized signcryption scheme. Theor. Comput. Sci. 412(45), 6382–6389 (2011)
Yang X.Y., Li M.T., Wei L.X., et al.: New ECDSA-verifiable multi-receiver generalization signcryption. In: The 10th IEEE International Conference on High Performance Computing and Communications, Dalian, pp. 1042–1047 (2008).
Han Y.L., Gui X.L.: Adaptive secure multicast in wireless networks. Int. J. Commun. Syst. 22(9), 1213–1239 (2009)
Han Y.L., Gui X.L.: BPGSC: Bilinear pairing based generalized signcryption scheme. In: 2009 Eighth International Conference on Grid and Cooperative Computing, Lanzhou, pp. 76–82 (2009).
Zhang C.R., Zhang Y.Q.: Secure and efficient generalized signcryption scheme based on a short ECDSA. In: The Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, pp. 466–469 (2010).
Ji H.F., Han W.B., Zhao L.: Identity-based generalized signcryption in standard model. Appl. Res. Comput. 27(10), 3851–3854 (2010) (in chinese)
Ji H.F., Han W.B., Liu L.D.: Identity based generalized signcryption scheme for multiple PKGs in standard model. J. Electron. Inf. Technol. 33(5), 1204–1210 (2011) (in chinese)
Ji H.F., Han W.B., Zhao L.: Certificateless generalized signcryption. Cryptology ePrint Archive, Report 2010/204. http://eprint.iacr.org (2010).
Kushwah P., Lai S.: Efficient generalized signcryption schemes. Cryptology ePrint Archive, Report 2010/346. http://eprint.iacr.org (2010).
Ji H.F., Han W.B., Zhao L.: Certificateless generalized signcryption. In: Proceedings of 2010 International Colloquium on Computing, Communication, Control, and Management (CCCM2010), vol. 2, Yangzhou (2010).
Selvi S.S.D., Vivek S.S., Rangan C.P.: Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing. Cryptology ePrint Archive, Report 2009/298. http://eprint.iacr.org (2009).
Au M.H., Chen J.K., Liu J.K., et al.: Malicious KGC attacks in certificateless cryptography. In: Proceedings of ASIACCS 2007, pp. 302–311. ACM, New York (2007).
Hwang Y.H., Liu J.K., Chow S.S.M.: Certificateless public key encryption secure against malicious KGC attacks in the standard model. J. Univers. Comput. Sci. 14(3), 463–480 (2008)
Xiong H., Qin Z.G., Li F.G.: An improved certificateless signature scheme secure in the standard model. Fundam. Inf. 88, 193–206 (2008)
Weng J., Yao G.X., Deng R.H. et al.: Cryptanalysis of a certificateless signcryption scheme in the standard model. Inf. Sci. 181, 661–667 (2011)
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by C. Blundo.
Rights and permissions
About this article
Cite this article
Zhou, C., Zhou, W. & Dong, X. Provable certificateless generalized signcryption scheme. Des. Codes Cryptogr. 71, 331–346 (2014). https://doi.org/10.1007/s10623-012-9734-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-012-9734-y
Keywords
- Certificateless generalized signcryption
- Malicious-but-passive KGC attacks
- Gap bilinear Diffie–Hellman assumption
- Computational Diffie–Hellman assumption
- Random oracle model