### An Efficient Provably Secure Certificateless Signcryption without Random Oracles

^{(*)}

*Corresponding author*

**DOI's assignment:**

*the author of the article can submit here a request for assignment of a DOI number to this resource!*

**Cost of the service: euros 10,00 (for a DOI)**

#### Abstract

Although most of existed signcryption schemes proven secure were proposed in the random oracle, however, it always could not be able to construct the corresponding schemes in the practical application. By analyzing several certificateless signcryption schemes in the standard model, it was pointed out that they are all not secure. Based on Au’s scheme, a new proven secure certificateless signcryption scheme was presented in the standard model by using bilinear pairing technique of elliptic curves. In the last, it was proved that the scheme satisfied indistinguishability against adaptive chosen ciphertext attack and existential unforgeability against adaptive chosen message and identity attack under the complexity assumptions, such as decisional bilinear Diffie-Hellman problem. So the scheme was secure and reliable. *Copyright © 2013 Praise Worthy Prize - All rights reserved.*

#### Keywords

#### Full Text:

PDF#### References

A. Shamir, Identity-based cryptosystems and signature schemes, Proceedings of CRYPTO 84 on Advances in Cryptology (Page: 47 Year of Publication: 1985 ISBN: 0-387-15658-5)

S. S. Al-Riyami, K.G. Paterson, Certificateless public key cryptography, Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security (Page: 452 Year of Publication: 2003 ISBN: 978-3-540-20592-0)

Y. Zheng, Digital signcryption or how to achieve cost(signature & encryption) << cost(signature) + cost(encryption), Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology (Page: 165 Year of Publication: 1997 ISBN: 3-540-63384-7)

J. H. An, Y. Dodis, T. Rabin, On the security of joint signature and encryption, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology (Page: 83 Year of Publication: 2002 ISBN: 3-540-43553-0)

J. Baek, R. Steinfeld, Y. L. Zheng, Formal proofs for the security of signcryption, Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography (Page: 80 Year of Publication: 2002 ISBN: 3-540-43168-3)

M. Barbosa, P. Farshim, Certificateless signcryption, Proceedings of the 2008 ACM symposium on Information, computer and communications security (Page: 369 Year of Publication: 2008 ISBN: 978-1-59593-979-1)

D. Aranha, R. Castro, J. Lopez, R. Dahab, Efficient certificateless signcryption, http://labcom.inf.ufrgs.br/labcom/ceseg/anais/2008/data/pdf/st03_01_resumo.pdf.

C. H. Wu, Z. X. Chen, A new efficient certificateless signcryption scheme, Proceedings of International Symposium on Information Science and Engineering (Page: 661 Year of Publication: 2008 ISBN: 978-1-4244-2727-4)

S. S. D. Selvi, S. S. Vivek, C. P. Rangan, Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing, Proceedings of the 5th International Conference on Information Security and Cryptology (Page: 75 Year of Publication: 2010 ISBN: 978-3-642-16341-8)

S. S. D. Selvi, S. S. Vivek, D. Shukla, P. R. Chandrasekaran, Efficient and provably secure certificateless multi-receiver signcryption, Proceedings of the Second International Conference on Provable Security (Page: 52 Year of Publication: 2008 ISBN: 978-3-540-88732-4)

W. J. Xie, Z. Zhang. Efficient and provably secure certificateless signcryption from bilinear maps, Proceedings of IEEE International Conference on Wireless Communications, Networking and Information Security (Page: 558 Year of Publication: 2010 ISBN: 978-1-4244-5850-9)

S. S. D. Selvi, S. S. Vivek, C. P. Rangan, Security weaknesses in two certificateless signcryption schemes, http://eprint.iacr.org/2010/092

Z. H. Liu, Y. P. Hu, X. S. Zhang, H. Ma, Certificateless signcryption scheme in the standard model, Information Sciences, Vol. 180, n. 3, pp. 452-464, 2010.

J. Weng, G. X. Yao, R. H. Deng, M. R. Chen, X. X. Li, Cryptanalysis of a certificateless signcryption scheme in the standard model, Information Sciences, Vol. 181, n. 3, pp. 661-667, 2011.

X. Y. Xiang, Certificateless signcryption scheme in standard model, Journal of Computer Application, Vol. 30, n. 8, pp. 2151-2153, 2010.

P. D. Wang, Y. Xie, F. Q. Xie, Provably secure certificateless signcryption scheme in standard model, Journal of Harbin University of Science and Technology, Vol. 17, n. 3, pp. 83-86, 2012.

### Refbacks

- There are currently no refbacks.

Please send any question about this web site to info@praiseworthyprize.com**Copyright © 2005-2023 Praise Worthy Prize**