|
|
Certificateless Aggregate Signcryption Scheme with Internal Security and Const Pairings |
ZHANG Yongjie① ZHANG Yulei② WANG Caifen② |
①(Gansu Health Vocational College, Lanzhou 730000, China)
②(College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China) |
|
|
Abstract Aggregate signcryption can not only reduce the cost of the verification of ciphertexts, but also ensure the confidentiality and authentication. Analyzed Liu et al ’s CertificateLess Aggregate SignCryption (CLASC) scheme with Const Pairings, it is found that type II adversary, who is the malicious key generator center, could forge the ciphertexts. It means that Liu et al’s scheme does not satisfy the indistinguishability under the adaptive chosen ciphertext attacks and unforgeability under the adaptive chosen message attacks. In order to improve the security level and verification efficiency of CLASC scheme, in this paper, the internal secure model of CLASC is defined and a concrete CLASC scheme with this property is presented. As the new scheme only needs 3 bilinear pairingis, it is more efficient than existing CLASC schemes. Based on the assumption of computational Diffie-Hellman, in the random oracle model and the internal security mode of CLASC, the new schems is proved to satisfy the confidentiality, unforgeability and public verification.
|
Received: 05 May 2017
Published: 01 November 2017
|
|
Fund:The National Natural Science Foundation of China (61163038, 61262056), The Higher Educational Scientific Research Foundation of Gansu Province (2017A-003, 2015B-220) |
Corresponding Authors:
ZHANG Yulei
E-mail: zhangyl@nwnu.edu.cn
|
|
|
|
[1] |
ZHENG Y L. Digital signcryption or how to achieve cost (signature & encryption)<<cost (signature)+cost (encryption)[C]. Proceedings of the Cryptology-CRYPTO 1997, California, USA, 1997: 165-179. doi: 10.1007/ BFb0052234.
|
[2] |
BAEK J, STEINFELD R, and ZHENG Yu-liang. Formal proofs for the security of signcryption[C]. Proceedings of the Cryptology-PKC2002, Paris, France, 2002: 81-98. doi: 10.1007/s00145-007-0211-0.
|
[3] |
AN J H, DODIS Y, and RABIN T. On the security of joint signature and encryption[C]. Proceedings of the Cryptography-EUROCRYPT 2002, Netherlands, 2002: 83-107. doi: 10.1007/3-540-46035-7_6.
|
[4] |
SELVI S S D, VIVEK S S, SHRIRAM J, et al. Identity based aggregate signcryption schemes[C]. Proceedings of the Cryptology-INDOCRYPT 2009, New Delhi, India, 2009: 378-397. doi: 10.1007/978-3-642-10628-6_25.
|
[5] |
张玉磊, 李臣意, 王彩芬, 等. 无证书聚合签名方案的安全性分析和改进[J]. 电子与信息学报, 2015, 37(8): 1994-1999. doi: 10.11999/JEIT141635.
|
|
ZHANG Y L, LI C Y, WANG C F, et al. Security analysis and improvements of certificateless aggregate signature schemes[J]. Journal of Electronics & Information Technology, 2015, 37(8): 1994-1999. doi: 10.11999/JEIT141635.
|
[6] |
LU H J and XIE Q. An efficient certificateless aggregate signcryption scheme from pairings[C]. IEEE Proceedings of International Conference on the Electronics, Communications and Control (ICECC), Ningbo, China, 2011: 132-135. doi: 10.1109/ICECC.2011.6067635.
|
[7] |
JIANG Y, LI J P, and XIONG A P. Certificateless aggregate signcryption scheme for wireless sensor network[J]. International Journal of Advancements in Computing Technology, 2013, 5(8): 456-463. doi: 10.4156/ijact.vol5. issue8.51.
|
[8] |
ESLAMI Z and NASROLLAH P. Certificateless aggregate signcryption: security model and a concrete construction secure in the random oracle model[J]. Journal of King Saud University-Computer and Information Sciences, 2014, 26(3): 276-286. doi: 10.1016/j.jksuci.2014.03.006.
|
[9] |
刘建华, 毛可飞, 胡俊伟. 基于双线性对的无证书聚合签密方案[J]. 计算机应用, 2016, 36(6): 1558-1562. doi: 10.11772/ j.issn.1001-9081.2016.06.1558.
|
|
LIU J H, MAO K F, and HU J W. Certificateless aggregate signcryption scheme based on bilinear pairings[J] Journal of Computer Applications, 2016, 36(6): 1558-1562. doi: 10.11772 /j.issn.1001-9081.2016.06.1558.
|
[10] |
张玉磊, 王欢, 李臣意, 等. 可证安全的紧致无证书聚合签密方案[J]. 电子与信息学报, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
|
|
ZHANG Y L, WANG H, LI C Y, et al. Provable secure and compact certificateless aggregate signcryption scheme[J]. Journal of Electronics & Information Technology, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
|
[11] |
CHEN J Q and REN X X. A privacy protection scheme based on certificateless aggregate signcryption and masking random number in smart grid[C]. The 4th International Conference on Mechanical Materials and Manufacturing Engineering (IC3ME2016), Shenzhen, China, 2016: 10-13. doi: 10.2991/ mmme-16.2016.3.
|
[12] |
刘建华, 赵长啸, 毛可飞. 高效的无证书聚合签密方案[J]. 计算机工程与应用, 2016, 52(12): 131-135. doi: 10.3778/j.issn. 1002-8331.1510-0193.
|
|
LIU J H, ZHAO C X, and MAO K F. Efficient certificateless aggregate signcryption scheme based on XOR[J]. Computer Engineering and Applications, 2016, 52(12): 131-135. doi: 10.3778/j.issn.1002-8331.1510-0193.
|
[13] |
POINTCHEVAL D and STERN J. Security arguments for digital dignatures and blind signatures[J]. Journal of Cryptology, 2001, 13(3): 361-396. doi: 10.1007/s0014500 10003.
|
[14] |
CHENG L, WEN Q Y, JIN Z P, et al. Cryptanalysis and improvement of a certificateless aggregate signature scheme [J]. Information Sciences, 2015, 295(2): 337-346. doi: 10.1016 /j.ins.2014.09.065.
|
|
|
|