Advanced Search
Volume 40 Issue 2
Feb.  2018
Turn off MathJax
Article Contents
ZHANG Yongjie, ZHANG Yulei, WANG Caifen. Certificateless Aggregate Signcryption Scheme with Internal Security and Const Pairings[J]. Journal of Electronics & Information Technology, 2018, 40(2): 500-508. doi: 10.11999/JEIT170419
Citation: ZHANG Yongjie, ZHANG Yulei, WANG Caifen. Certificateless Aggregate Signcryption Scheme with Internal Security and Const Pairings[J]. Journal of Electronics & Information Technology, 2018, 40(2): 500-508. doi: 10.11999/JEIT170419

Certificateless Aggregate Signcryption Scheme with Internal Security and Const Pairings

doi: 10.11999/JEIT170419
Funds:

The National Natural Science Foundation of China (61163038, 61262056), The Higher Educational Scientific Research Foundation of Gansu Province (2017A-003, 2015B-220)

  • Received Date: 2017-05-05
  • Rev Recd Date: 2017-09-16
  • Publish Date: 2018-02-19
  • Aggregate signcryption can not only reduce the cost of the verification of ciphertexts, but also ensure the confidentiality and authentication. Analyzed Liu et al s CertificateLess Aggregate SignCryption (CLASC) scheme with Const Pairings, it is found that type II adversary, who is the malicious key generator center, could forge the ciphertexts. It means that Liu et als scheme does not satisfy the indistinguishability under the adaptive chosen ciphertext attacks and unforgeability under the adaptive chosen message attacks. In order to improve the security level and verification efficiency of CLASC scheme, in this paper, the internal secure model of CLASC is defined and a concrete CLASC scheme with this property is presented. As the new scheme only needs 3 bilinear pairingis, it is more efficient than existing CLASC schemes. Based on the assumption of computational Diffie-Hellman, in the random oracle model and the internal security mode of CLASC, the new schems is proved to satisfy the confidentiality, unforgeability and public verification.
  • loading
  • ZHENG Y L. Digital signcryption or how to achieve cost (signature encryption)cost (signature)+cost (encryption)[C]. Proceedings of the Cryptology-CRYPTO 1997, California, USA, 1997: 165-179. doi: 10.1007/ BFb0052234.
    BAEK J, STEINFELD R, and ZHENG Yu-liang. Formal proofs for the security of signcryption[C]. Proceedings of the Cryptology-PKC2002, Paris, France, 2002: 81-98. doi: 10.1007/s00145-007-0211-0.
    AN J H, DODIS Y, and RABIN T. On the security of joint signature and encryption[C]. Proceedings of the Cryptography-EUROCRYPT 2002, Netherlands, 2002: 83-107. doi: 10.1007/3-540-46035-7_6.
    SELVI S S D, VIVEK S S, SHRIRAM J, et al. Identity based aggregate signcryption schemes[C]. Proceedings of the Cryptology-INDOCRYPT 2009, New Delhi, India, 2009: 378-397. doi: 10.1007/978-3-642-10628-6_25.
    张玉磊, 李臣意, 王彩芬, 等. 无证书聚合签名方案的安全性分析和改进[J]. 电子与信息学报, 2015, 37(8): 1994-1999. doi: 10.11999/JEIT141635.
    ZHANG Y L, LI C Y, WANG C F, et al. Security analysis and improvements of certificateless aggregate signature schemes[J]. Journal of Electronics Information Technology, 2015, 37(8): 1994-1999. doi: 10.11999/JEIT141635.
    LU H J and XIE Q. An efficient certificateless aggregate signcryption scheme from pairings[C]. IEEE Proceedings of International Conference on the Electronics, Communications and Control (ICECC), Ningbo, China, 2011: 132-135. doi: 10.1109/ICECC.2011.6067635.
    JIANG Y, LI J P, and XIONG A P. Certificateless aggregate signcryption scheme for wireless sensor network[J]. International Journal of Advancements in Computing Technology, 2013, 5(8): 456-463. doi: 10.4156/ijact.vol5. issue8.51.
    ESLAMI Z and NASROLLAH P. Certificateless aggregate signcryption: security model and a concrete construction secure in the random oracle model[J]. Journal of King Saud University-Computer and Information Sciences, 2014, 26(3): 276-286. doi: 10.1016/j.jksuci.2014.03.006.
    刘建华, 毛可飞, 胡俊伟. 基于双线性对的无证书聚合签密方案[J]. 计算机应用, 2016, 36(6): 1558-1562. doi: 10.11772/ j.issn.1001-9081.2016.06.1558.
    LIU J H, MAO K F, and HU J W. Certificateless aggregate signcryption scheme based on bilinear pairings[J] Journal of Computer Applications, 2016, 36(6): 1558-1562. doi: 10.11772 /j.issn.1001-9081.2016.06.1558.
    张玉磊, 王欢, 李臣意, 等. 可证安全的紧致无证书聚合签密方案[J]. 电子与信息学报, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
    ZHANG Y L, WANG H, LI C Y, et al. Provable secure and compact certificateless aggregate signcryption scheme[J]. Journal of Electronics Information Technology, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
    CHEN J Q and REN X X. A privacy protection scheme based on certificateless aggregate signcryption and masking random number in smart grid[C]. The 4th International Conference on Mechanical Materials and Manufacturing Engineering (IC3ME2016), Shenzhen, China, 2016: 10-13. doi: 10.2991/ mmme-16.2016.3.
    刘建华, 赵长啸, 毛可飞. 高效的无证书聚合签密方案[J]. 计算机工程与应用, 2016, 52(12): 131-135. doi: 10.3778/j.issn. 1002-8331.1510-0193.
    LIU J H, ZHAO C X, and MAO K F. Efficient certificateless aggregate signcryption scheme based on XOR[J]. Computer Engineering and Applications, 2016, 52(12): 131-135. doi: 10.3778/j.issn.1002-8331.1510-0193.
    POINTCHEVAL D and STERN J. Security arguments for digital dignatures and blind signatures[J]. Journal of Cryptology, 2001, 13(3): 361-396. doi: 10.1007/s0014500 10003.
    CHENG L, WEN Q Y, JIN Z P, et al. Cryptanalysis and improvement of a certificateless aggregate signature scheme [J]. Information Sciences, 2015, 295(2): 337-346. doi: 10.1016 /j.ins.2014.09.065.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1054) PDF downloads(130) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return