Advanced Search
Volume 43 Issue 9
Sep.  2021
Turn off MathJax
Article Contents
Yulei ZHANG, Qiaoling BAI, Yanli MA, Chenyang YAN, Caifen WANG. Certificateless Signcryption with Equality Test[J]. Journal of Electronics & Information Technology, 2021, 43(9): 2534-2541. doi: 10.11999/JEIT200805
Citation: Yulei ZHANG, Qiaoling BAI, Yanli MA, Chenyang YAN, Caifen WANG. Certificateless Signcryption with Equality Test[J]. Journal of Electronics & Information Technology, 2021, 43(9): 2534-2541. doi: 10.11999/JEIT200805

Certificateless Signcryption with Equality Test

doi: 10.11999/JEIT200805
Funds:  The National Natural Science Foundation of China (61662069), The Higher Educational Scientific Research Foundation of Gansu Province (2017A-003, 2018A-207)
  • Received Date: 2020-09-14
  • Rev Recd Date: 2021-03-15
  • Available Online: 2021-03-26
  • Publish Date: 2021-09-16
  • In cloud computing applications, it is very important to ensure the confidentiality and unforgeability of messages, while judging the equivalence of different ciphertexts to plaintexts. The signcryption scheme with equality test can achieve the above security goals. Based on the certificateless public key cryptography environment, a Certificateless SignCryption scheme with Equality Test (CLSCET) is designed. Firstly, the framework and security model of the certificateless signcryption with equality test scheme are proposed, moreover two types of adversaries with different attack capabilities and three types of security targets are defined. Secondly, a specific certificateless signcryption with equality test scheme is constructed, and the correctness of the scheme is analyzed. Finally, based on the random oracle model, it is proved that the scheme satisfies the security properties of One-Way against Chosen Ciphertext Attack(OW-CCA), INDistinguishability against adaptive Chosen Ciphertext Attack(IND-CCA2) and Existential UnForgeability against adaptive Chosen Message Attack(EUF-CMA). Compared with the existing approximate schemes, the scheme satisfies the confidentiality of IND-CCA2, the unforgeability of EUF-CMA and the one-way ciphertext of OW-CCA.
  • loading
  • [1]
    ZHENG Y. Digital signcryption or how to achieve cost(signature & encryption) << cost(signature) + cost(encryption)[C]. The 17th Annual International Cryptology Conference, Santa Barbara, USA, 1997: 165-179. doi: 10.1007/BFb0052234.
    [2]
    SHAMIR A. Identity-based Cryptosystems and Signature Schemes[M]. BLAKLEY G R and CHAUM D. Advances in Cryptology. Berlin, Germany, Springer, 1985: 47–53. doi: 10.1007/3-540-39568-7_5.
    [3]
    AL-RIYAMI S S and PATERSON K G. Certificateless public key cryptography[C]. The 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, China, 2003: 452–473. doi: 10.1007/978-3-540-40061-5_29.
    [4]
    BARBOSA M and FARSHIM P. Certificateless signcryption[C]. 2008 ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, 2008: 369-372. doi: 10.1145/1368310.1368364.
    [5]
    WU Chenhuang and CHEN Zhixiong. A new efficient certificateless signcryption scheme[C]. 2008 International Symposium on Information Science and Engineering, Shanghai, China, 2008: 661-664. doi: 10.1109/ISISE.2008.206.
    [6]
    王星, 钱海峰. 高效的无证书签密方案[J]. 计算机工程与应用, 2011, 47(20): 62–64. doi: 10.3778/j.issn.1002-8331.2011.20.019

    WANG Xing and QIAN Haifeng. Efficient certificateless signcryption scheme[J]. Computer Engineering and Applications, 2011, 47(20): 62–64. doi: 10.3778/j.issn.1002-8331.2011.20.019
    [7]
    周彦伟, 杨波, 王青龙. 安全的无双线性映射的无证书签密机制[J]. 软件学报, 2017, 28(10): 2757–2768. doi: 10.13328/j.cnki.jos.005150

    ZHOU Yanwei, YANG Bo, and WANG Qinglong. Secure certificateless signcryption scheme without bilinear pairing[J]. Journal of Software, 2017, 28(10): 2757–2768. doi: 10.13328/j.cnki.jos.005150
    [8]
    MANDAL S, MOHANTY S, and MAJHI B. Universally Verifiable Certificateless Signcryption Scheme for MANET[M]. NATH V. Proceedings of the International Conference on Microelectronics, Computing & Communication Systems. Singapore: Springer, 2018: 77-89. doi: 10.1007/978-981-10-5565-2_7.
    [9]
    LUO Ming and WAN Yuwei. An enhanced certificateless signcryption in the standard model[J]. Wireless Personal Communications, 2018, 98(3): 2693–2709. doi: 10.1007/s11277-017-4995-4
    [10]
    YANG Guomin, TAN C H, HUANG Qiong, et al. Probabilistic public key encryption with equality test[C]. Cryptographers’ Track at the RSA Conference, San Francisco, USA, 2010: 119–131. doi: 10.1007/978-3-642-11925-5_9.
    [11]
    MA Sha. Identity-based encryption with outsourced equality test in cloud computing[J]. Information Sciences, 2016, 328: 389–402. doi: 10.1016/j.ins.2015.08.053
    [12]
    QU Haipeng, YAN Zhen, LIN Xijun, et al. Certificateless public key encryption with equality test[J]. Information Sciences, 2018, 462: 76–92. doi: 10.1016/j.ins.2018.06.025
    [13]
    张玉磊, 陈文娟, 张永洁, 等. 支持关键字搜索的无证书密文等值测试加密方案[J]. 电子与信息学报, 2020, 42(11): 2713–2719. doi: 10.11999/JEIT190752

    ZHANG Yulei, CHEN Wenjuan, ZHANG Yongjie, et al. Certificateless puklic key encryption with equality test of supporting keyword search[J]. Journal of Electronics &Information Technology, 2020, 42(11): 2713–2719. doi: 10.11999/JEIT190752
    [14]
    PBC Library. The pairing-based cryptography library[EB/OL]. http://crypto.stanford.edu/pbc/, 2015.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(2)  / Tables(1)

    Article Metrics

    Article views (1044) PDF downloads(116) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return