scispace - formally typeset
Open AccessPosted Content

A note on the Certificateless Multi-receiver Signcryption Scheme.

Reads0
Chats0
TLDR
This note strengthens the security of the certificateless multi-receiver signcryption scheme in [23] by proposing suitable enhancement to the scheme.
Abstract
Certificateless cryptography aims at combining the advantages of identity based and public key cryptography, so as to avoid the key escrow problem inherent in the identity based system and cumbersome certificate management in public key infrastructure. Signcryption achieves confidentiality and authentication simultaneously in an efficient manner. Multi-receiver signcryption demands signcrypting the same message efficiently for a large number of receivers. In this note, we strengthen the security of the certificateless multi-receiver signcryption scheme in [23] by proposing suitable enhancement to the scheme.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Certificateless aggregate signcryption

TL;DR: The goal of this paper is to overcome the key escrow problem and propose a suitable security model for aggregate signcryption in the certificateless setting and prove the security of the proposed scheme in the random oracle model under the gap Bilinear Diffie-Hellman and computational Diffie -Hellman intractability assumptions.
Journal ArticleDOI

On security of a certificateless signcryption scheme

TL;DR: This paper describes an adversary that can break the IND-CCA2 security of the signcryption scheme without any Unsigncryption query, and demonstrates that the scheme is insecure against key replacement attack by describing a concrete attack approach.
Journal ArticleDOI

Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing

TL;DR: A new CLSC scheme without bilinear pairing is proposed and it is demonstrated it is provably secure in the random oracle model and neither unforgeability property nor confidentiality property is provided.
Book ChapterDOI

Certificateless KEM and hybrid signcryption schemes revisited

TL;DR: The first certificateless hybrid signcryption scheme was proposed by Fagen Li et al. as mentioned in this paper, which is not Type-I CCA secure and is existentially forgeable.
Journal ArticleDOI

Efficient Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Bilinear Pairings

TL;DR: An efficient anonymous certificateless multi-receiver signcryption scheme is proposed with its security proved under the random oracle model, improved largely in computational efficiency by the idea that it is designed based on scalar point multiplications on ECC instead of the bilinear pairing.
References
More filters
Book ChapterDOI

Certificateless Public Key Cryptography

TL;DR: In this article, the concept of certificateless public key cryptography (CL-PKC) was introduced and made concrete, which does not require certificates to guarantee the authenticity of public keys.
Book ChapterDOI

Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption)

TL;DR: Signcryption as discussed by the authors is a new cryptographic primitive which simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step, and with a cost significantly lower than that required by signature-then-encryption.
Journal Article

A forward-secure public-key encryption scheme

TL;DR: In this paper, the first constructions of a (non-interactive) forward-secure public-key encryption scheme were presented, and the main construction achieves security against chosen plaintext attacks under the decisional bilinear Diffie-Hellman assumption in the standard model.
Book ChapterDOI

Public-key encryption in a multi-user setting: security proofs and improvements

TL;DR: It is proved that security in the single-user setting implies security inThe multi- user setting as long as the former is interpreted in the strong sense of "indistinguishability," thereby pin-pointing many schemes guaranteed to be secure against Hastad-type attacks.
Book ChapterDOI

Efficient and provably-secure identity-based signatures and signcryption from bilinear maps

TL;DR: A new identity-based signcryption (IBSC) scheme built upon bilinear maps is described that is more efficient than all others proposed so far and also faster than all known pairing-based IBS methods.
Related Papers (5)