Cryptanalysis of a Pairing-free Certificateless Signcryption scheme
نویسندگان
چکیده
منابع مشابه
Cryptanalysis of a Certificateless Ring Signcryption Scheme
Certificateless public key cryptography (CL-PKC) is an appealing paradigm with the advantages of both conventional public key cryptosystem and ID-based cryptosystem because it avoids using certificates and eliminates the key escrow problem. Ring signcryption is an attractive primitive which allows one user to send a message anonymously, confidentially and authentically. Recently, Qi et al. prop...
متن کاملCertificateless Signcryption without Pairing
Certificateless public key cryptography is receiving significant attention because it is a new paradigm that simplifies the traditional PKC and solves the inherent key escrow problem suffered by ID-PKC. Certificateless signcryption is one of the most important security primitives in CL-PKC. However, to the best of our knowledge, all constructions of certificateless signcryption (CLSC) in the li...
متن کاملEfficient Certificateless Signcryption Scheme
In this paper, we propose a certificateless signcryption scheme from Weil pairings and give a practical security model. Compared with existing schemes, the new scheme is more efficient.
متن کاملCryptanalysis of pairing-free certificateless authenticated key agreement protocol
Abstract: Recently, He et al. [D. He, J. Chen, J. Hu, A pairing-free certificateless authenticated key agreement protocol, International Journal of Communication Systems, 25(2), pp. 221-230, 2012] proposed a pairing-free certificateless authenticated key agreement protocol and demonstrated that their protocol is provable security in the random oracle model. However, in this paper, we show that ...
متن کاملOn security of a certificateless signcryption scheme
It would be interesting if a signcryption scheme in the standard model could be made certificateless. One of the interesting attempts is due to Liu et al. [Z. Liu, Y. Hu, X. Zhang, H. Ma, Certificateless signcryption scheme in the standard model, Information Sciences 180 (3) (2010) 452-464]. In this paper, we provide a cryptanalysis on this scheme by depicting two kinds of subtle public key rep...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ICT Express
سال: 2021
ISSN: 2405-9595
DOI: 10.1016/j.icte.2020.07.006