skip to main content
10.1145/3207677.3277995acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaeConference Proceedingsconference-collections
research-article

A New Signcryption Scheme without Certificate and Linear Pairing

Published: 22 October 2018 Publication History

Abstract

Most1 certificateless signcryption schemes are based on bilinear pairing operations. Thus, the computation efficiency is low. In this paper, a new signcryption scheme without certificate and linear pairing is proposed. This scheme is proved to be secure in therandom oracle model under the hardness assumption of computational the problem of discrete logarithm. In addition, the user's partial private key can be verified. Compared with other schemes, the scheme is more optimized in terms of security and computation efficiency.

References

[1]
Y. Zheng. 1997. Digital Signcryption or How to Achieve Cost (signature&encryption). (in Chinese). Advances in Cryptology-CRYPTO'97, Berlin, New York, Tokyo, 165--179.
[2]
S.S. Al-Riyami and K.G. Paterson. 2003. Certificateless Public Key Cryptography. Asiacrypt, 2894, 2, 452--473.
[3]
M. Barbosa and P. Farshim. 2008. Certificateless Signcryption. Symposium on Information, Computer and Communications Security, ACM, 369--372.
[4]
L. Chen and C. Kudla. 2007. Identity Based Authenticated Key Agreement Protocols from Pairings. International Journal of Information Security, 6, 4, 213--241.
[5]
H. Zhu, H. Li, and Y. Wang. 2010. Research and Development of Certificateless Signcryption Scheme without Bilinear Pairing (in Chinese) Journal of Computer Research and Development, 47, 9, 1587--1594.
[6]
A. Xia and L. Zhang. 2014. A New Certificateless Secure Signcryption Scheme without Bilinear Pairs (in Chinese). Application Research of Computers, 31, 2, 532--535.
[7]
C. Z. Zou. 2016. Certificateless Signcryption Scheme (in Chinese). Computer Applications and Software, 33, 3, 327--333.
[8]
A. Fan, Z. Q. Pan, and W. T. Zhao. 2016. Cryptanalysis and Improvement of Two Certificateless Signcryption Schemes (in Chinese). Computer Applications and Software, 33, 7, 313--317.
[9]
Z. Zhao. 2015. Security Analysis and Improvement of Certificateless Signcryption Mechanism (in Chinese). Journal on Communications, 3, 125--130.
[10]
Y. Zhou, B. Yang, and W. Z. Zhang. 2016. Security Analysis and Improvement of Certificateless Signcryption Scheme without Bilinear Pairing (in Chinese). Chinese Journal of Software, 39, 6, 1257--1266.
[11]
X. Wang, Z. H. Qi, and H. Huang. 2017. Certificateless Signcryption Scheme without Bilinear Pairing (in Chinese). Computer Technology and Development, 27, 7, 106--110.
[12]
D. Pointcheval and J. Stern. 2000. Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology, 13, 3, 361--396.

Cited By

View all
  • (2022)Efficient and Secure Key Management and Authentication Scheme for WBSNs Using CP-ABE and Consortium BlockchainJournal of Sensors10.1155/2022/24199922022(1-20)Online publication date: 22-Sep-2022
  • (2020)Quadratic Poly Certificateless Inductive Signcryption for Network SecurityMobile Networks and Applications10.1007/s11036-019-01496-0Online publication date: 2-Jan-2020

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSAE '18: Proceedings of the 2nd International Conference on Computer Science and Application Engineering
October 2018
1083 pages
ISBN:9781450365123
DOI:10.1145/3207677
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 October 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Certificateless signcryption
  2. confidentiality attack
  3. forgery attack
  4. public key encryption
  5. random oracle model

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

CSAE '18

Acceptance Rates

CSAE '18 Paper Acceptance Rate 189 of 383 submissions, 49%;
Overall Acceptance Rate 368 of 770 submissions, 48%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Efficient and Secure Key Management and Authentication Scheme for WBSNs Using CP-ABE and Consortium BlockchainJournal of Sensors10.1155/2022/24199922022(1-20)Online publication date: 22-Sep-2022
  • (2020)Quadratic Poly Certificateless Inductive Signcryption for Network SecurityMobile Networks and Applications10.1007/s11036-019-01496-0Online publication date: 2-Jan-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media