Cryptanalysis of a certificateless signcryption scheme in the standard model
نویسندگان
چکیده
منابع مشابه
An efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کاملCryptanalysis of a Certificateless Ring Signcryption Scheme
Certificateless public key cryptography (CL-PKC) is an appealing paradigm with the advantages of both conventional public key cryptosystem and ID-based cryptosystem because it avoids using certificates and eliminates the key escrow problem. Ring signcryption is an attractive primitive which allows one user to send a message anonymously, confidentially and authentically. Recently, Qi et al. prop...
متن کاملan efficient certificateless signcryption scheme in the standard model
certificateless public key cryptography (cl-pkc) is a useful method in order to solve the problems of traditional public key infrastructure (i. e. large amount of computation, storage and communication cost for managing certificates) and id-based public key cryptography (i. e. key escrow problem), simultaneously. a signcryption scheme is an important primitive in cryptographic protocols which p...
متن کاملEfficient Certificateless Signcryption Scheme
In this paper, we propose a certificateless signcryption scheme from Weil pairings and give a practical security model. Compared with existing schemes, the new scheme is more efficient.
متن کاملA supplement to Liu et al.'s certificateless signcryption scheme in the standard model
Recently, Liu et al. proposed the first certificateless signcryption scheme without random oracles and proved it was semantically secure in the standard model. However, Selvi et al. launched a fatal attack to its confidentiality by replacing users’ public keys, thus pointed out this scheme actually doesn’t reach the semantic security as claimed. In this paper, we come up with a rescue scheme ba...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Sciences
سال: 2011
ISSN: 0020-0255
DOI: 10.1016/j.ins.2010.09.037