• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhu Hui, Li Hui, and Wang Yumin. Certificateless Signcryption Scheme Without Pairing[J]. Journal of Computer Research and Development, 2010, 47(9): 1587-1594.
Citation: Zhu Hui, Li Hui, and Wang Yumin. Certificateless Signcryption Scheme Without Pairing[J]. Journal of Computer Research and Development, 2010, 47(9): 1587-1594.

Certificateless Signcryption Scheme Without Pairing

More Information
  • Published Date: September 14, 2010
  • Signcryption is a cryptographic primitive that fulfills both the functions of the public key digital signature and the public key encryption in a logical single step, at a cost in the computational and communication significantly lower than that required by the traditional “signature then encryption” approach. Based on discrete logarithm, a new certificateless signcryption scheme without using the bilinear pairings is presented in this paper, and the method to build certificateless signcryption scheme without using the bilinear pairings seems to have never been addressed in the existing literatures. The security analysis of the proposed scheme in the implementation plan with the random oracle model is presented in this paper, and the results show that the proposed scheme is secure on the assumption that the compute Diffle-Hellman problem and the discrete logarithm problem are the difficult problems. The proposed scheme also has the security properties of confidentiality, non-forgeability, publicly verifiability, non-repudiation and perfect forward security, etc. Moreover, the implementation of the proposed scheme only requires three times exponent operations and without any bilinear pairing operation. Compared with other existing certificateless signcryption schemes in the computational complexity, the proposed scheme is more efficient.
  • Related Articles

    [1]Zhang Zhanpeng, Li Kexin, Kan Haibin. An Open Blockchain Oracle Scheme Based on Decentralized Identity[J]. Journal of Computer Research and Development, 2023, 60(11): 2489-2503. DOI: 10.7544/issn1000-1239.202330200
    [2]Wang Qiang, Zhou Fucai, Xuan Pengkai, Wu Qiyu. Publicly Verifiable Database Model with Full Operations Based on Bilinear Map[J]. Journal of Computer Research and Development, 2019, 56(3): 521-532. DOI: 10.7544/issn1000-1239.2019.20170839
    [3]Yuan Ke, Liu Zheli, Jia Chunfu, Ma Haoyu, Lü Shuwang. Research on Timed-Release Encryption[J]. Journal of Computer Research and Development, 2014, 51(6): 1206-1220.
    [4]Ma Zhuo, Zhang Junwei, Ma Jianfeng, and Ji Wenjiang. Provably Secure Certificateless Trusted Access Protocol for WLAN Without Pairing[J]. Journal of Computer Research and Development, 2014, 51(2): 325-333.
    [5]Zhou Yousheng, Sun Yanbin, Qing Sihan, Yang Yixian. An Efficient ID-Based Verifiably Encrypted Signature Scheme[J]. Journal of Computer Research and Development, 2011, 48(8): 1350-1356.
    [6]Chen Hu, Zhu Changjie, Song Rushun. Efficient Certificateless Signature and Group Signature Schemes[J]. Journal of Computer Research and Development, 2010, 47(2): 231-237.
    [7]Xu Peng, Cui Guohua, and Lei Fengyu. An Efficient and Provably Secure IBE Scheme Without Bilinear Map[J]. Journal of Computer Research and Development, 2008, 45(10): 1687-1695.
    [8]Tian Junfeng, Jiao Hongqiang, Li Ning, and Liu Tao. Double Secret Keys and Double Random Numbers Authentication Scheme[J]. Journal of Computer Research and Development, 2008, 45(5): 779-785.
    [9]Shi Rui and Yang Xiaozong. Research on the Node Spatial Probabilistic Distribution of the Random Waypoint Mobility Model for Ad Hoc Network[J]. Journal of Computer Research and Development, 2005, 42(12): 2056-2062.
    [10]Ma Chunbo, He Dake. A New Chameleon Threshold Signature Based on Bilinear Pairing[J]. Journal of Computer Research and Development, 2005, 42(8): 1427-1430.

Catalog

    Article views (971) PDF downloads (798) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return