Certificateless Aggregate Signcryption Scheme with Internal Security and Const Pairings
ZHANG Yongjie① ZHANG Yulei② WANG Caifen②
①(Gansu Health Vocational College, Lanzhou 730000, China) ②(College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China)
Abstract:Aggregate signcryption can not only reduce the cost of the verification of ciphertexts, but also ensure the confidentiality and authentication. Analyzed Liu et al ’s CertificateLess Aggregate SignCryption (CLASC) scheme with Const Pairings, it is found that type II adversary, who is the malicious key generator center, could forge the ciphertexts. It means that Liu et al’s scheme does not satisfy the indistinguishability under the adaptive chosen ciphertext attacks and unforgeability under the adaptive chosen message attacks. In order to improve the security level and verification efficiency of CLASC scheme, in this paper, the internal secure model of CLASC is defined and a concrete CLASC scheme with this property is presented. As the new scheme only needs 3 bilinear pairingis, it is more efficient than existing CLASC schemes. Based on the assumption of computational Diffie-Hellman, in the random oracle model and the internal security mode of CLASC, the new schems is proved to satisfy the confidentiality, unforgeability and public verification.
ZHENG Y L. Digital signcryption or how to achieve cost (signature & encryption)<<cost (signature)+cost (encryption)[C]. Proceedings of the Cryptology-CRYPTO 1997, California, USA, 1997: 165-179. doi: 10.1007/ BFb0052234.
[2]
BAEK J, STEINFELD R, and ZHENG Yu-liang. Formal proofs for the security of signcryption[C]. Proceedings of the Cryptology-PKC2002, Paris, France, 2002: 81-98. doi: 10.1007/s00145-007-0211-0.
[3]
AN J H, DODIS Y, and RABIN T. On the security of joint signature and encryption[C]. Proceedings of the Cryptography-EUROCRYPT 2002, Netherlands, 2002: 83-107. doi: 10.1007/3-540-46035-7_6.
[4]
SELVI S S D, VIVEK S S, SHRIRAM J, et al. Identity based aggregate signcryption schemes[C]. Proceedings of the Cryptology-INDOCRYPT 2009, New Delhi, India, 2009: 378-397. doi: 10.1007/978-3-642-10628-6_25.
ZHANG Y L, LI C Y, WANG C F, et al. Security analysis and improvements of certificateless aggregate signature schemes[J]. Journal of Electronics & Information Technology, 2015, 37(8): 1994-1999. doi: 10.11999/JEIT141635.
[6]
LU H J and XIE Q. An efficient certificateless aggregate signcryption scheme from pairings[C]. IEEE Proceedings of International Conference on the Electronics, Communications and Control (ICECC), Ningbo, China, 2011: 132-135. doi: 10.1109/ICECC.2011.6067635.
[7]
JIANG Y, LI J P, and XIONG A P. Certificateless aggregate signcryption scheme for wireless sensor network[J]. International Journal of Advancements in Computing Technology, 2013, 5(8): 456-463. doi: 10.4156/ijact.vol5. issue8.51.
[8]
ESLAMI Z and NASROLLAH P. Certificateless aggregate signcryption: security model and a concrete construction secure in the random oracle model[J]. Journal of King Saud University-Computer and Information Sciences, 2014, 26(3): 276-286. doi: 10.1016/j.jksuci.2014.03.006.
LIU J H, MAO K F, and HU J W. Certificateless aggregate signcryption scheme based on bilinear pairings[J] Journal of Computer Applications, 2016, 36(6): 1558-1562. doi: 10.11772 /j.issn.1001-9081.2016.06.1558.
ZHANG Y L, WANG H, LI C Y, et al. Provable secure and compact certificateless aggregate signcryption scheme[J]. Journal of Electronics & Information Technology, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
[11]
CHEN J Q and REN X X. A privacy protection scheme based on certificateless aggregate signcryption and masking random number in smart grid[C]. The 4th International Conference on Mechanical Materials and Manufacturing Engineering (IC3ME2016), Shenzhen, China, 2016: 10-13. doi: 10.2991/ mmme-16.2016.3.
LIU J H, ZHAO C X, and MAO K F. Efficient certificateless aggregate signcryption scheme based on XOR[J]. Computer Engineering and Applications, 2016, 52(12): 131-135. doi: 10.3778/j.issn.1002-8331.1510-0193.
[13]
POINTCHEVAL D and STERN J. Security arguments for digital dignatures and blind signatures[J]. Journal of Cryptology, 2001, 13(3): 361-396. doi: 10.1007/s0014500 10003.
[14]
CHENG L, WEN Q Y, JIN Z P, et al. Cryptanalysis and improvement of a certificateless aggregate signature scheme [J]. Information Sciences, 2015, 295(2): 337-346. doi: 10.1016 /j.ins.2014.09.065.