scispace - formally typeset
Journal ArticleDOI

Efficient Certificateless Signcryption in the Standard Model: Revisiting Luo and Wan’s Scheme from Wireless Personal Communications (2018)

TLDR
This paper proposes a CL-SC scheme with KSSTIS, which is provably secure in the standard model and shows that unfortunately Luo and Wan made a significant error in the construction of their proposed scheme.
Abstract
\n Certificateless public key cryptography (CL-PKC) promises a practical resolution in establishing practical schemes, since it addresses two fundamental issues, namely the necessity of requiring certificate managements in traditional public key infrastructure (PKI) and the key escrow problem in identity-based (ID-based) setting concurrently. Signcryption is an important primitive that provides the goals of both encryption and signature schemes as it is more efficient than encrypting and signing messages consecutively. Since the concept of certificateless signcryption (CL-SC) scheme was put forth by Barbosa and Farshim in 2008, many schemes have been proposed where most of them are provable in the random oracle model (ROM) and only a few number of them are provable in the standard model. Very recently, Luo and Wan (Wireless Personal Communication, 2018) proposed a very efficient CL-SC scheme in the standard model. Furthermore, they claimed that their scheme is not only more efficient than the previously proposed schemes in the standard model, but also it is the only scheme which benefits from known session-specific temporary information security (KSSTIS). Therefore, this scheme would indeed be very practical. The contributions of this paper are 2-fold. First, in contrast to the claim made by Luo and Wan, we show that unfortunately Luo and Wan made a significant error in the construction of their proposed scheme. While their main intention is indeed interesting and useful, the failure of their construction has indeed left a gap in the research literature. Hence, the second contribution of this paper is to fill this gap by proposing a CL-SC scheme with KSSTIS, which is provably secure in the standard model.

read more

Citations
More filters
Journal ArticleDOI

A Certificateless Signcryption Mechanism Based on Blockchain for Edge Computing

TL;DR: Wang et al. as discussed by the authors proposed a certificateless signcryption mechanism based on blockchain, which can make good use of the nontamperable feature of blockchain, prevent illegal users from substituting the public key of the user, and guarantee signature nonrepudiation.
Journal ArticleDOI

An Anonymous Certificateless Signcryption Scheme for Secure and Efficient Deployment of Internet of Vehicles

TL;DR: In this article, an anonymous certificateless signcryption scheme for Internet of Vehicles (IoV) based on the Hyperelliptic Curve (HEC) was proposed.
Journal ArticleDOI

On the Security Of A Certificateless Signcryption With Known Session-Specific Temporary Information Security In The Standard Model

TL;DR: It is pointed out that the proposed certificateless signcryption scheme is insecure, which implies that how to construct a secure CL-SC scheme with KSSTIS in the standard model is still an open problem.
Journal ArticleDOI

An Efficient Pairing-Free Certificateless Signcryption Without Secure Channel Communication During Secret Key Issuance ☆

TL;DR: This paper aims to present a new certificateless signcryption scheme that does not consider secure channel communication, and is designed without considering high computation bilinear pairing and map-to-point (MTP) hash function.
Posted ContentDOI

A New Certificateless Signcryption Scheme for Securing Internet of Vehicles

TL;DR: A certificateless signcryption scheme based on Elliptic Curve Digital Signature Algorithm, which also considers pseudonym and timestamp mechanism, has been designed in this paper and it is proved that the proposed scheme can be reduced to solving the difficulty of the Computational Diffie-Hellman problem under the standard model.
References
More filters
Posted Content

The Random Oracle Methodology, Revisited

TL;DR: In this paper, the authors take a critical look at the relationship between the security of cryptographic schemes in the Random Oracle Model, and the schemes that result from implementing the random oracle by so called "cryptographic hash functions".
Journal ArticleDOI

The random oracle methodology, revisited

TL;DR: In this article, the authors take a critical look at the relationship between the security of cryptographic schemes in the Random Oracle Model, and the schemes that result from implementing the random oracle by so-called "cryptographic hash functions".
Journal ArticleDOI

Certificateless signcryption scheme in the standard model

TL;DR: The proposed certificateless signcryption scheme is proven to be IND-CCA2 secure under the decisional Bilinear Diffie-Hellman intractability assumption without using the random oracles and to be existentially unforgeable under the computational Diffie -Hellmanintractability assumptions.
Journal ArticleDOI

Identity-based chameleon hashing and signatures without key exposure

TL;DR: This paper proposes the first identity-based chameleon hash scheme without key exposure based on the three-trapdoor mechanism, which provides an affirmative answer to the open problem.
Journal ArticleDOI

Cryptanalysis of a certificateless signcryption scheme in the standard model

TL;DR: By giving concrete attacks, this work indicates that Liu et al.'s certificateless signcryption scheme is not secure in this strengthened security model.
Related Papers (5)