Skip to main content
Log in

On security of a Certificateless Hybrid Signcryption Scheme

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Certificateless hybrid signcryption is a newly cryptosystem that plays a great role in some storage-constrained networks when confidentiality and authenticity are needed simultaneously. Now considering almost all certificateless signcryption schemes that have been proposed in the literature cannot effectively against the public-key-replacement attacks. In this paper, we proposed a hybrid signcryption scheme in the certificateless setting to fill this security gaps, and its security has been verified to achieve the confidentiality and unforgeability in random oracle model. Moreover, performance analysis shows the proposed scheme is efficient and practical.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Uhsadel, L., Ullrich, M., Das, A., et al. (2013). Teaching HW/SW co-design with a public key cryptography application. IEEE Transactions on Education, 56(4), 478–483.

    Article  Google Scholar 

  2. Chan, S., Guizani, M., Chen, C., et al. (2014). An enhanced public key infrastructure to secure smart grid wireless communication networks. IEEE Network, 28(1), 10–16.

  3. Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In CRYPTO’84. Lecture notes in computer science (Vol. 196, pp. 47–53). Springer: Heidelberg.

  4. Malone-Lee, J. (2002). Identity-based signcryption. IACR Cryptology ePrint Archive, 2002, 98.

    Google Scholar 

  5. Hölbl, M., Welzer, T., & Brumen, B. (2012). An improved two-party identity-based authenticated key agreement protocol using pairings. Journal of Computer and System Sciences, 78(1), 142–150.

    Article  MathSciNet  MATH  Google Scholar 

  6. Yin, A., Liang, H., & Zhu, M. (2014). Authentication protocol using MYK-NTRUSign signature algorithm in wireless network environment. Journal of Networks, 9(5), 1139–1144.

    Article  Google Scholar 

  7. Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Proceedings of ASIACRYPT 2003. Lecture notes in computer science (Vol. 2894, pp. 452–473). Heidelberg: Springer.

  8. Barbosa, M., & Farshim, P. (2008). Certificateless signcryption. In Proceedings of ASIACCS’2008 (pp. 369–372). New York: ACM.

  9. Han, Y. L., & Gui, X. L. (2009). BPGSC: Bilinear pairing based generalized signcryption scheme. In 2009 eighth international conference on grid and cooperative computing (pp. 76–82) Lanzhou.

  10. Wu, C., & Chen, Z. (2008). A new efficient certificateless signcryption scheme. In International symposium on information science and engineering, 2008 (ISISE’08) (Vol. 1, pp. 661–664). Shanghai: IEEE.

  11. Selvi, S. S. D., Vivek, S. S., & Rangan, C. P. (2009). On the security of certificateless signcryption schemes. INSCRYPT, 9, 75–92.

    Google Scholar 

  12. Selvi, S. S. D., Vivek, S. S., & Rangan, C. P. (Eds.). (2011). Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing. In Information security and cryptology (pp. 75–92). Berlin, Heidelberg: Springer.

  13. Cramer, R., & Shoup, V. (2003). Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing, 33(1), 167–226.

    Article  MathSciNet  MATH  Google Scholar 

  14. Kurosawa, K., & Desmedt, Y. (2004). A new paradigm of hybrid encryption scheme. Lecture Notes in Computer Science, 3152, 426–442.

    Article  MathSciNet  Google Scholar 

  15. Chen, L., Cheng, Z., Malone-Lee, J., & Smart, N. P. (2006). Efficient ID-KEM based on the Sakai-Kasahara key construction. IEE Proceedings-Information Security, 153, 19–26.

    Article  Google Scholar 

  16. Bentahar, K., Farshim, P., Malone-Lee, J., & Smart, N. P. (2008). Generic constructions of identity-based and certificateless KEMs. Journal of Cryptology, 21, 178–199.

    Article  MathSciNet  MATH  Google Scholar 

  17. Li, F., Shirase, M., & Takagi, T. (2013). Certificateless hybrid signcryption. Mathematical and Computer Modelling, 57(3), 324–343.

    Article  MathSciNet  MATH  Google Scholar 

  18. Weng, J., Yao, G. X., Deng, R. H., et al. (2011). Cryptanalysis of a certificateless signcryption scheme in the standardmodel. Information Sciences, 181, 661–667.

    Article  MathSciNet  MATH  Google Scholar 

  19. Selvi, S. S. D., Vivek, S. S., & Rangan, C. P. (2010). Security weaknesses in two certificateless signcryption schemes. IACR Cryptology ePrint Archive, 2010, 92–95.

  20. Zhou, C., Zhou, W., & Dong, X. (2014). Provable certificateless generalized signcryption scheme. Designs, Codes and Cryptography, 71(2), 331–346.

    Article  MathSciNet  MATH  Google Scholar 

  21. Liu, Z., Hu, Y., Zhang, X., et al. (2010). Certificateless signcryption scheme in the standard model. Information Sciences, 180(3), 452–464.

    Article  MathSciNet  MATH  Google Scholar 

  22. Boneh, D., & Boyen, X. (2011). Efficient selective identity-based encryption without random oracles. Journal of Cryptology, 24(4), 659–693.

    Article  MathSciNet  MATH  Google Scholar 

  23. Herranz, J., Ruiz, A., & Sáez, G. (2014). Signcryption schemes with threshold unsigncryption, and applications. Designs, Codes and Cryptography, 70(3), 323–345.

    Article  MathSciNet  MATH  Google Scholar 

  24. Galbraith, S. D., Paterson, K. G., & Smart, N. P. (2008). Pairings for cryptographers. Discrete Applied Mathematics, 156(16), 3113–3121.

    Article  MathSciNet  MATH  Google Scholar 

  25. Granger, R., & Smart, N. P. (2006) On computing products of pairings. IACR Cryptology ePrint Archive, 2006, 172–183.

Download references

Acknowledgments

This work was partially supported by the National Science Foundation of China under Grants 61262079.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongchao Liang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yin, A., Liang, H. On security of a Certificateless Hybrid Signcryption Scheme. Wireless Pers Commun 85, 1727–1739 (2015). https://doi.org/10.1007/s11277-015-2864-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2864-6

Keywords

Navigation