A secure electronic cash based on a certificateless group signcryption scheme
نویسندگان
چکیده
Many certificateless schemes have been proposed for different purposes, but as for as their applications in any electronic cash schemes there is still a lot of potential for strengthening the security aspect, and this paper is an attempt towards this. In this paper we propose a new type certificateless scheme which is applied for group oriented signcryption rather than a signature without using bilinear pairing, then a new E-cash system has been presented based on the proposed scheme. The salient feature of the proposed scheme is that any signcrypter of a group can signcrypt a document with the group manager and send it to the verifier. The verifier verifies the authenticity of the signcrypted text by using the group’s public parameters and cannot link a signcrypted text to the corresponding signcrypter. However, even the group manager or any signcrypter of that group alone cannot produce a valid signcrypted text. In case of any legal dispute, such as no repudiation of the signature, the groupmanager has the ability to reveal the identity of the signcrypter. The proposed scheme is secure against the indistinguishably chosen cipher text attack (IND-CCA). Unlinkability, unforgeability and traceability and its security are based on the two computationally hard problems, the Computational Diffie–Hellman Problem (CDHP) and Discrete Logarithmic Problem (DLP). The new scheme’s security analysis clearly suggests that it is very reliable to be used in security vulnerable applications in real life. © 2012 Published by Elsevier Ltd
منابع مشابه
An efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کاملCertificateless KEM and Hybrid Signcryption Schemes Revisited
Often authentication and confidentiality are required as simultaneous key requirements in many cryptographic applications. The cryptographic primitive called signcryption effectively implements the same and while most of the public key based systems are appropriate for small messages, hybrid encryption (KEM-DEM) provides an efficient and practical way to securely communicate very large messages...
متن کاملCertificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model
Certificateless cryptography; Aggregate signcryption; Random oracle model; Bilinear pairing Abstract The concept of aggregate signcryption was first introduced in 2009 by Selvi et al. [Identity based aggregate signcryption schemes, Lecture Notes in Computer Science 5922 LNCS, 2009, pp. 378–397]. The aggregation process of these schemes reduces the amount of exchanged information and is particul...
متن کاملEfficient Generalized Signcryption
Generalized signcryption is a new cryptographic primitive which works as a signcryption scheme, a signature scheme and an encryption scheme as per need. Recently Ji et al. proposed a security model for certificateless generalized signcryption scheme and also proposed a scheme which they claim is secure under the proposed security model. In this paper we show that Ji et al. scheme is not existen...
متن کاملCryptanalysis of a Certificateless Ring Signcryption Scheme
Certificateless public key cryptography (CL-PKC) is an appealing paradigm with the advantages of both conventional public key cryptosystem and ID-based cryptosystem because it avoids using certificates and eliminates the key escrow problem. Ring signcryption is an attractive primitive which allows one user to send a message anonymously, confidentially and authentically. Recently, Qi et al. prop...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Mathematical and Computer Modelling
دوره 58 شماره
صفحات -
تاریخ انتشار 2013