Browse > Article
http://dx.doi.org/10.3837/tiis.2020.06.012

Provably secure certificateless encryption scheme in the standard model  

Deng, Lunzhi (School of Mathematical Sciences, Guizhou Normal University)
Xia, Tian (School of Mathematical Sciences, Guizhou Normal University)
He, Xiuru (School of Mathematical Sciences, Guizhou Normal University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.14, no.6, 2020 , pp. 2534-2553 More about this Journal
Abstract
Recently, numerous certificateless encryption (CLE) schemes have been introduced. The security proofs of most schemes are given under the random oracle model (ROM). In the standard model, the adversary is able to calculate the hash function instead of asking the challenger. Currently, there is only one scheme that was proved to be secure in SM. In this paper, we constructed a new CLE scheme and gave the security proofs in SM. In the new scheme, the size of the storage space required by the system is constant. The computation cost is lower than other CLE schemes due to it needs only two pairing operations.
Keywords
Certificateless encryption; Pairing; Standard model; Diffie-Hellman problem; Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Zhou, Y., and Yang, B., "Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing," Information Processing Letters, vol.130, pp.16-24, 2018.   DOI
2 SK Hafizul, I., Muhammad, K., and Ali M, Al., "Anonymous and provably secure certificateless multi receiver encryption without bilinear pairing," Security and Communication Networks, vol.8, pp.2214-2231, 2015.   DOI
3 He, D., Wang, H., Wang, L., Shen, J., and Yang, X., "Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices," Soft Computing, vol.21, no.22, pp.6801-6810, 2017.   DOI
4 Gao, R., Zeng, J., and Deng L., "Efficient certificateless anonymous multi-Receiver encryption scheme without bilinear parings," Mathematical Problems in Engineering, Article ID 1486437, 13 pages, 2018.
5 Huang, Q., and Wong, D.S., "Generic certificateless encryption in the standard model," in Proc. of International Workshop on Security, LNCS, vol.4752, pp.278-291, 2007.
6 Dent, A.W., Libert, B., and Paterson, K.G., "Certificateless encryption schemes strongly secure in the standard model," in Proc. of International Workshop on Public Key Cryptography, LNCS, vol.4939, pp.344-359, 2008.
7 Hwang, Y.H., Liu, J.K., and Chow, S.S, "Certificateless public key encryption secure against malicious KGC attacks in the standard model," Journal of Universal Computer Science, vol.14, no.3, pp.463-480, 2008.
8 Zhang, G., and Wang, X, "Certificateless encryption scheme secure in standard model," Tsinghua Science & Technology, vol.14, no.4, pp.452-459, 2009.   DOI
9 Shen, L., Zhang, F., Sun, Y., and Li, S., "Cryptanalysis of a certificateless encryption scheme in the standard model," in Proc. of International Conference on Intelligent Networking and Collaborative Systems, pp.329-333, 2012.
10 Shamir, A., "Identity-based cryptosystem and signature scheme," Advances in Cryptology-Crypto, LNCS, vol.196, pp. 47-53, 1984.
11 Al-Riyami, S.S., and Paterson, K.G., "Certificateless public key cryptography," Advances in Cryptology-Asiacrypt, LNCS, vol.2894, pp.452-473, 2003.
12 Libert, B., and Quisquater, J., "On constructing certificateless cryptosystems from identity based encryption," in Proc. of International Workshop on Public Key Cryptography, LNCS, vol.3958, pp.474-490, 2006.
13 Yan, X., Gong, P., Bai, Z., Wang, J., and Li, P., "New certificateless public key encryption scheme without pairing," IET Information Security, vol.7, iss.4, pp.271-276, 2013.   DOI
14 Sun, Y., and Li, H., "short-ciphertext and BDH-based CCA2 secure certificateless encryption," Science China: Information Science, vol.53, pp.2005-2015, 2010.   DOI
15 Baek, J., Safavi-Naini, R., and Susilo, W., "Certificateless public key encryption without pairing," in Proc. of International Conference on Information Security, LNCS, vol.3650, pp.134-148, 2005.
16 Sun, Y., Zhang, F., and Baek, J., "Strongly secure certificateless public key encryption without pairing," in Proc. of International Conference on Cryptology and Network Security, LNCS, vol.4856, pp.194-208, 2007.
17 Guo, R., Wen, Q., Shi, H., Jin, Z., and Zhang, H, "An efficient and provably secure certificateless public key encryption scheme for telecare medicine information systems," Journal of Medical Systems, vol.37, no.5, pp.9965, 2013.   DOI
18 Deng, L., Zeng, J., Wang, X, "An improved certificateless encryption scheme for telecare medicine information systems," Journal of Internet Technology, vol.18, no.2, pp.223-227, 2017.
19 He, D., Zeadally, S., Kumar, N., and Wu, W., "Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures," IEEE transactions on information forensics and security, vol.11, no.9, pp.2052-2064, 2016.   DOI
20 Reza, S., Ron S., and Josef, Pieprzyk., "Lattice-based certificateless public-key encryption in the standard model," International Journal of Information Security, vol.13, pp.315-333, 2014.   DOI
21 Cheng, L., Wen, Q., Jin, Z., and Zhang, H., "Cryptanalysis and improvement of a certificateless encryption scheme in the standard model," Frontiers of Computer Science, vol.8, no.1, pp.163-173, 2014.   DOI