Abstract

Certificateless generalized signcryption adaptively work as certificateless signcryption, signature or encryption scheme having single algorithm for suitable storage-constrained environments. Recently, Zhou et al. proposed a novel Certificates generalized scheme, and proved its ciphertext indistinguishability under adaptive chosen ciphertext attacks (IND-CCA2) using Gap Bi-linear Diffie-Hellman and Computational Diffie-Hellman assumption as well as proved existential unforgeability against chosen message attacks (EUF-CMA) using the Gap Bi-linear Diffie-Hellman and Computational Diffie-Hellman assumption in random oracle model. In this paper, we analyzed Zhou et al. scheme and unfortunately proved IND-CCA2 insecure in encryption and signcryption modes in defined security model. We also present a practical and improved scheme, provable secure in random oracle model.

Highlights

  • Diffie-Hellman [2] introduced the concept of trapdoor one way function, while the concept of encryption and digital signature using public key approach were realized by Rivest, Shamir and Adleman [3], within Public Key Infrastructure (P KI)

  • To make certificate management more simple for public key in P KI Shamir [4] introduced notion of Identity Based Encryption (IBE), later on Boneh Franklin [5] realized in 2001 using Weil pairing

  • A N ew − certificateless generalized signcryption (CLGSC) scheme is secure against IN D − CLGSC −CCA2−I in encryption only mode or signcryption only mode if it is secure for all Probabilistic Polynomial Time PPT adversary A-I and game winning consider negligible

Read more

Summary

INTRODUCTION

Diffie-Hellman [2] introduced the concept of trapdoor one way function, while the concept of encryption and digital signature using public key approach were realized by Rivest, Shamir and Adleman [3], within Public Key Infrastructure (P KI). User identity and associated public key used for composition of key pair It does not require pricey infrastructure like P KI and cope the limitations of IBE. Kushwah and Lal [10] proposed ID Based generalized signcryption (GSC) scheme within a security model for the first time. Huifang et al [11] first proposed certificateless generalized signcryption (CLGSC) scheme,and introduced CLGSC formal definition and security model. Www.ijacsa.thesai.org (IJACSA) International Journal of Advanced Computer Science and Applications, Vol 10, No 4, 2019 scheme presented in 2017[21] and that same year Wang et al.[22] introduced ID based to P KI in standard model scheme These above few heterogeneous schemes found in literature but the generalized form still missing.

PRELIMINARIES
Framework of N-CLGSC
Security Analysis
Adaptation
CRYPTANALYSIS OF N-CLGSC
IMPROVED N-CLGSC
Variation
ANALYSIS OF IN-CLGSC
Unforgeability of Proof IN-CLGSC
Cost Analysis
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call