Skip to main content
Log in

Provable certificateless generalized signcryption scheme

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

Generalized signcryption can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm. It is very suitable for storage-constrained environments. In this paper, we introduce a formal security model for certificateless generalized signcryption schemes secure against the malicious-but-passive key generation center attacks and propose a novel scheme. Our scheme is proved to be IND-CCA2 secure under the GBDH assumption and CDH assumption and existentially unforgeable under the GDH’ assumption and CDH assumption in random oracle model. Furthermore, performance analysis shows the proposed scheme is efficient and practical.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Shamir A.: Identity-based cryptosystems and signature schemes. In: CRYPTO’84. Lecture Notes in Computer Science, vol. 196, pp. 47–53. Springer, Heidelberg (1984).

  2. Al-Riyami S.S., Paterson K.G.: Certificateless public key cryptography. In: Proceedings of ASIACRYPT 2003. Lecture Notes in Computer Science, vol. 2894, pp. 452–473. Springer, Heidelberg (2003).

  3. Zheng Y.L.: Digital signcryption or how to achieve cost (Signature & Encryption) Cost (Signature) + Cost (Encryption). In: CRYPTO’97. Lecture Notes in Computer Science, vol. 1294, pp. 165–179. Springer, Heidelberg (1997).

  4. Barbosa M., Farshim P.: Certificateless signcryption. In: Proceedings of ASIACCS’2008, pp. 369–372. ACM, New York (2008).

  5. Han Y.L., Yang X.Y., Wei P., et al.: ECGSC: elliptic curve based generalized signcryption. In: The 3rd International Conference on Ubiquitous Intelligence and Computing (UIC-2006). Lecture Notes in Computer Science, vol. 4159, pp. 956–965. Springer, Heidelberg (2006).

  6. Han Y.L.: Generalization of signcryption for resources-constrained environments. Wirel. Commun. Mobile Comput. 7(7), 919–931 (2007)

    Article  Google Scholar 

  7. ANSI X9.62: Public key cryptography for the financial services industry: the Elliptic Curve Digital Signature Algorithm (ECDSA). (1999).

  8. Wang X.A., Yang X.Y., Han Y.L.: Provable secure generalized signcryption. Cryptology ePrint Archive, Report 2007/173. http://eprint.iacr.org (2007).

  9. Lai S., Kushwah P.: ID-based generalized signcryption. Cryptology ePrint Archive, Report 2008/084. http://eprint.iacr.org (2008).

  10. Yu G., Ma X.X., Shen Y. et al.: Provable secure identity based generalized signcryption scheme. Theor. Comput. Sci. 411(40–42), 3614–3624 (2010)

    Article  MATH  MathSciNet  Google Scholar 

  11. Kushwah P., Lai S.: An efficient identity based generalized signcryption scheme. Theor. Comput. Sci. 412(45), 6382–6389 (2011)

    Article  MATH  Google Scholar 

  12. Yang X.Y., Li M.T., Wei L.X., et al.: New ECDSA-verifiable multi-receiver generalization signcryption. In: The 10th IEEE International Conference on High Performance Computing and Communications, Dalian, pp. 1042–1047 (2008).

  13. Han Y.L., Gui X.L.: Adaptive secure multicast in wireless networks. Int. J. Commun. Syst. 22(9), 1213–1239 (2009)

    Article  Google Scholar 

  14. Han Y.L., Gui X.L.: BPGSC: Bilinear pairing based generalized signcryption scheme. In: 2009 Eighth International Conference on Grid and Cooperative Computing, Lanzhou, pp. 76–82 (2009).

  15. Zhang C.R., Zhang Y.Q.: Secure and efficient generalized signcryption scheme based on a short ECDSA. In: The Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, pp. 466–469 (2010).

  16. Ji H.F., Han W.B., Zhao L.: Identity-based generalized signcryption in standard model. Appl. Res. Comput. 27(10), 3851–3854 (2010) (in chinese)

    Google Scholar 

  17. Ji H.F., Han W.B., Liu L.D.: Identity based generalized signcryption scheme for multiple PKGs in standard model. J. Electron. Inf. Technol. 33(5), 1204–1210 (2011) (in chinese)

    Article  MathSciNet  Google Scholar 

  18. Ji H.F., Han W.B., Zhao L.: Certificateless generalized signcryption. Cryptology ePrint Archive, Report 2010/204. http://eprint.iacr.org (2010).

  19. Kushwah P., Lai S.: Efficient generalized signcryption schemes. Cryptology ePrint Archive, Report 2010/346. http://eprint.iacr.org (2010).

  20. Ji H.F., Han W.B., Zhao L.: Certificateless generalized signcryption. In: Proceedings of 2010 International Colloquium on Computing, Communication, Control, and Management (CCCM2010), vol. 2, Yangzhou (2010).

  21. Selvi S.S.D., Vivek S.S., Rangan C.P.: Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing. Cryptology ePrint Archive, Report 2009/298. http://eprint.iacr.org (2009).

  22. Au M.H., Chen J.K., Liu J.K., et al.: Malicious KGC attacks in certificateless cryptography. In: Proceedings of ASIACCS 2007, pp. 302–311. ACM, New York (2007).

  23. Hwang Y.H., Liu J.K., Chow S.S.M.: Certificateless public key encryption secure against malicious KGC attacks in the standard model. J. Univers. Comput. Sci. 14(3), 463–480 (2008)

    MATH  MathSciNet  Google Scholar 

  24. Xiong H., Qin Z.G., Li F.G.: An improved certificateless signature scheme secure in the standard model. Fundam. Inf. 88, 193–206 (2008)

    MATH  MathSciNet  Google Scholar 

  25. Weng J., Yao G.X., Deng R.H. et al.: Cryptanalysis of a certificateless signcryption scheme in the standard model. Inf. Sci. 181, 661–667 (2011)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Caixue Zhou.

Additional information

Communicated by C. Blundo.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhou, C., Zhou, W. & Dong, X. Provable certificateless generalized signcryption scheme. Des. Codes Cryptogr. 71, 331–346 (2014). https://doi.org/10.1007/s10623-012-9734-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-012-9734-y

Keywords

Mathematics Subject Classification (2010)

Navigation