Skip to main content
Log in

An Enhanced Certificateless Signcryption in the Standard Model

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Signcryption is a cryptography prototype which performs message encryption and signature in a logical step. Certificateless public key cryptography successfully resolves the problem of certificate management in traditional public key cryptography and key escrow problem in identity-based public key cryptography. There are lots of efficient certificateless signcryption schemes that have been proposed, most of which are proved secure under the random oracle model. But when applied in practical situations, the random oracle model will cause many security problems due to its own defects. Nowadays, more and more people pay attention to the standard model which provides a stronger security. In this paper, we present an efficient certificateless signcryption scheme that is provably secure in the standard model. Under the Decisional Bilinear Diffie–Hellman and Computational Diffie–Hellman hard problems, our scheme satisfies the ability of indistinguishability against adaptive chosen ciphertext attack and existential unforgeability against adaptive chosen message attack. Moreover, our scheme satisfies known session-specific temporary information security that most of signcryption schemes in the standard model cannot achieve this security attribute. Compared with other signcryption schemes, our scheme achieves shorter ciphertext length, better performance efficiency and stronger security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Al-Riyami, S. S., & Paterson, K.G. (2003). Certificateless public key cryptography. In Advances in cryptography-ASIACRYPT 2003 (pp. 452–473). Berlin, Germany.

  2. Barbosa, M., & Farshim, P. (2008). Certificateless signcryption. Cryptology ePrint Archive, Retrieved from http://eprint.iacr.org/2008/143.pdf.

  3. Luo, M., Wang, S. Q., & Hu, J. (2016). A more efficient and secure broadcast signcryption scheme using certificateless public-key cryptography for resource-constrained networks. Journal of Internet Technology, 17(1), 81–89.

    Google Scholar 

  4. Zhou, Y. W., Yang, B., & Zhang, W. J. (2016). Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing. Discrete Applied Mathematics, 204, 185–202.

    Article  MathSciNet  MATH  Google Scholar 

  5. Canetti, R., Goldreich, O., & Halevi, S. (2004). The random oracle methodology, revisited. Journal of the ACM, 51(4), 557–594.

    Article  MathSciNet  MATH  Google Scholar 

  6. Paterson, K. G., & Schuldt, J. C. N. (2006). Efficient identity-based signatures secure in the standard model. In IACR ePrint Archive, http://eprint.iacr.org/2006/080

  7. Yu, Y., Yang, B., Sun, Y., & Zhu, S. (2009). Identity based signcryption scheme without random oracles. Computer Standards & Interfaces, 31(1), 56–62.

    Article  Google Scholar 

  8. Li, X., Qian, H., Weng, J., & Yu, Y. (2013). Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model. Mathematical and Computer Modelling, 57(3), 503–511.

    Article  MathSciNet  MATH  Google Scholar 

  9. Liu, Z., Hu, Y., Zhang, X., & Ma, H. (2010). Certificateless signcryption scheme in the standard model. Information Sciences, 180(3), 452–464.

    Article  MathSciNet  MATH  Google Scholar 

  10. Miao, S., Zhang, F., Li, S., & Mu, Y. (2013). On security of a certificateless signcryption scheme. Information Sciences, 232, 475–481.

    Article  MathSciNet  MATH  Google Scholar 

  11. Weng, J., Yao, G., Deng, R. H., & Li, X. (2011). Cryptanalysis of a certificateless signcryption scheme in the standard model. Information Sciences, 181(3), 661–667.

    Article  MathSciNet  MATH  Google Scholar 

  12. Jin, Z., Wen, Q., & Zhang, H. (2010). A supplement to Liu et al.’s certificateless signcryption scheme in the standard model. Cryptology ePrint Archive, Retrieved from http://eprint.iacr.org/2010/252.pdf.

  13. Xiong, H. (2014). Toward Certificateless Signcryption Scheme Without Random Oracles. Cryptology ePrint Archive, Retrieved from: http://eprint.iacr.org/2014/162.pdf.

  14. Cheng, L., & Wen, Q. Y. (2015). An improved certificateless signcryption in the standard model. International Journal of Network Security, 17(5), 597–606.

    Google Scholar 

  15. Zhou, C. X., Gao, G. Y., & Cui, Z. M. (2017). Certificateless signcryption in the standard model. Wireless Personal Communications, 92(2), 495–513.

    Article  Google Scholar 

  16. Au, M. H., Chen, J., Liu, J. K., Mu, Y., Wong, D. S., & Yang, G. M. (2007). Malicious KGC attacks in certificateless cryptography. In Proceedings of ASIACCS’2007 (pp. 302–311). New York: ACM.

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China under Grant (Nos. 61662046 and 61601215); and the research project of Jiangxi Province under Grant (Nos. 20171BCB23014 and 20142BBE50019).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ming Luo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Luo, M., Wan, Y. An Enhanced Certificateless Signcryption in the Standard Model. Wireless Pers Commun 98, 2693–2709 (2018). https://doi.org/10.1007/s11277-017-4995-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4995-4

Keywords

Navigation