Loading…

Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultan...

Full description

Saved in:
Bibliographic Details
Published in:TheScientificWorld 2014-01, Vol.2014 (2014), p.1-12
Main Authors: Lu, Yang, Li, Jiguo
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c572t-7c38c9b62abf84ac23f3e8f4d839991f07d061a14f29c385f7dc4de7e46bdf9c3
cites cdi_FETCH-LOGICAL-c572t-7c38c9b62abf84ac23f3e8f4d839991f07d061a14f29c385f7dc4de7e46bdf9c3
container_end_page 12
container_issue 2014
container_start_page 1
container_title TheScientificWorld
container_volume 2014
creator Lu, Yang
Li, Jiguo
description Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.
doi_str_mv 10.1155/2014/295419
format article
fullrecord <record><control><sourceid>gale_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_7658fe623bf24f5b91cf10c3a259988d</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A413711001</galeid><doaj_id>oai_doaj_org_article_7658fe623bf24f5b91cf10c3a259988d</doaj_id><sourcerecordid>A413711001</sourcerecordid><originalsourceid>FETCH-LOGICAL-c572t-7c38c9b62abf84ac23f3e8f4d839991f07d061a14f29c385f7dc4de7e46bdf9c3</originalsourceid><addsrcrecordid>eNqNks9rFDEUgAdR7Fo9eZcBL6JMm5-TyUVYl6qLBcUqeAuZ5GWadTazJjPK_vdmO21pPZkcQl6-9yUvvKJ4jtEJxpyfEoTZKZGcYfmgWGBORSUY-_GwWBDK66rGDB0VT1LaIEQbgfnj4ogwyWWN6kWxOXPOGw9hLFcQR583eoTqnU5gywvfBRP3u9EPobwAM0Uodad9SGP5ZWp7b8pPsC-_wq7XBrYHyXIctfmZSh1suQ7JW4g3safFI6f7BM-u1-Pi-_uzb6uP1fnnD-vV8rwyXJCxEoY2RrY10a1rmDaEOgqNY7ahUkrskLCoxhozR2RGuRPWMAsCWN1al0PHxXr22kFv1C76rY57NWivrgJD7JTOlZoelKh546AmtHWEOd5KbBxGhmrCpWwam11vZ9duardgTS4x6v6e9P5J8JeqG34rhjgRDc2CV9eCOPyaII1q65OBvtcBhikpzBnCmEjKMvryH3QzTDHkrzpQIo_mSngyU53OBfjghnyvydPC1pshgPM5vmSYCowRwjnhzZxg4pBSBHf7eozUoYHUoYHU3ECZfnG34Fv2pmMy8HoGLn2w-o__PxtkBJy-AzOZafoXFMzXiw</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1547777883</pqid></control><display><type>article</type><title>Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks</title><source>Wiley Online Library Open Access</source><source>Publicly Available Content (ProQuest)</source><source>PubMed Central</source><creator>Lu, Yang ; Li, Jiguo</creator><contributor>Cao, Tianjie</contributor><creatorcontrib>Lu, Yang ; Li, Jiguo ; Cao, Tianjie</creatorcontrib><description>Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.</description><identifier>ISSN: 2356-6140</identifier><identifier>ISSN: 1537-744X</identifier><identifier>EISSN: 1537-744X</identifier><identifier>DOI: 10.1155/2014/295419</identifier><identifier>PMID: 24959606</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Access to Information ; Algorithms ; Analysis ; Computer Security ; Confidentiality ; Cryptography ; Cybersecurity ; Data encryption ; Models, Theoretical ; Network security ; Public key encryption ; Public Key Infrastructure</subject><ispartof>TheScientificWorld, 2014-01, Vol.2014 (2014), p.1-12</ispartof><rights>Copyright © 2014 Yang Lu and Jiguo Li.</rights><rights>COPYRIGHT 2014 John Wiley &amp; Sons, Inc.</rights><rights>Copyright © 2014 Yang Lu and Jiguo Li. Yang Lu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</rights><rights>Copyright © 2014 Y. Lu and J. Li. 2014</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c572t-7c38c9b62abf84ac23f3e8f4d839991f07d061a14f29c385f7dc4de7e46bdf9c3</citedby><cites>FETCH-LOGICAL-c572t-7c38c9b62abf84ac23f3e8f4d839991f07d061a14f29c385f7dc4de7e46bdf9c3</cites><orcidid>0000-0003-4860-8384</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/1547777883/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/1547777883?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>230,314,723,776,780,881,25732,27903,27904,36991,36992,44569,53769,53771,74872</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/24959606$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><contributor>Cao, Tianjie</contributor><creatorcontrib>Lu, Yang</creatorcontrib><creatorcontrib>Li, Jiguo</creatorcontrib><title>Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks</title><title>TheScientificWorld</title><addtitle>ScientificWorldJournal</addtitle><description>Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.</description><subject>Access to Information</subject><subject>Algorithms</subject><subject>Analysis</subject><subject>Computer Security</subject><subject>Confidentiality</subject><subject>Cryptography</subject><subject>Cybersecurity</subject><subject>Data encryption</subject><subject>Models, Theoretical</subject><subject>Network security</subject><subject>Public key encryption</subject><subject>Public Key Infrastructure</subject><issn>2356-6140</issn><issn>1537-744X</issn><issn>1537-744X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNqNks9rFDEUgAdR7Fo9eZcBL6JMm5-TyUVYl6qLBcUqeAuZ5GWadTazJjPK_vdmO21pPZkcQl6-9yUvvKJ4jtEJxpyfEoTZKZGcYfmgWGBORSUY-_GwWBDK66rGDB0VT1LaIEQbgfnj4ogwyWWN6kWxOXPOGw9hLFcQR583eoTqnU5gywvfBRP3u9EPobwAM0Uodad9SGP5ZWp7b8pPsC-_wq7XBrYHyXIctfmZSh1suQ7JW4g3safFI6f7BM-u1-Pi-_uzb6uP1fnnD-vV8rwyXJCxEoY2RrY10a1rmDaEOgqNY7ahUkrskLCoxhozR2RGuRPWMAsCWN1al0PHxXr22kFv1C76rY57NWivrgJD7JTOlZoelKh546AmtHWEOd5KbBxGhmrCpWwam11vZ9duardgTS4x6v6e9P5J8JeqG34rhjgRDc2CV9eCOPyaII1q65OBvtcBhikpzBnCmEjKMvryH3QzTDHkrzpQIo_mSngyU53OBfjghnyvydPC1pshgPM5vmSYCowRwjnhzZxg4pBSBHf7eozUoYHUoYHU3ECZfnG34Fv2pmMy8HoGLn2w-o__PxtkBJy-AzOZafoXFMzXiw</recordid><startdate>20140101</startdate><enddate>20140101</enddate><creator>Lu, Yang</creator><creator>Li, Jiguo</creator><general>Hindawi Publishing Corporation</general><general>John Wiley &amp; Sons, Inc</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>CGR</scope><scope>CUY</scope><scope>CVF</scope><scope>ECM</scope><scope>EIF</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7QP</scope><scope>7TK</scope><scope>7TM</scope><scope>7X2</scope><scope>7X7</scope><scope>7XB</scope><scope>88E</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FH</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AEUYN</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>ATCPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BHPHI</scope><scope>CCPQU</scope><scope>CWDGH</scope><scope>DWQXO</scope><scope>FR3</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>HCIFZ</scope><scope>K9.</scope><scope>M0K</scope><scope>M0S</scope><scope>M1P</scope><scope>P5Z</scope><scope>P62</scope><scope>P64</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>RC3</scope><scope>7X8</scope><scope>5PM</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-4860-8384</orcidid></search><sort><creationdate>20140101</creationdate><title>Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks</title><author>Lu, Yang ; Li, Jiguo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c572t-7c38c9b62abf84ac23f3e8f4d839991f07d061a14f29c385f7dc4de7e46bdf9c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Access to Information</topic><topic>Algorithms</topic><topic>Analysis</topic><topic>Computer Security</topic><topic>Confidentiality</topic><topic>Cryptography</topic><topic>Cybersecurity</topic><topic>Data encryption</topic><topic>Models, Theoretical</topic><topic>Network security</topic><topic>Public key encryption</topic><topic>Public Key Infrastructure</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lu, Yang</creatorcontrib><creatorcontrib>Li, Jiguo</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>Medline</collection><collection>MEDLINE</collection><collection>MEDLINE (Ovid)</collection><collection>MEDLINE</collection><collection>MEDLINE</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Calcium &amp; Calcified Tissue Abstracts</collection><collection>Neurosciences Abstracts</collection><collection>Nucleic Acids Abstracts</collection><collection>Agricultural Science Collection</collection><collection>ProQuest Health &amp; Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Medical Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Natural Science Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest One Sustainability</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>Agricultural &amp; Environmental Science Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest Natural Science Collection</collection><collection>ProQuest One Community College</collection><collection>Middle East &amp; Africa Database</collection><collection>ProQuest Central</collection><collection>Engineering Research Database</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Health &amp; Medical Complete (Alumni)</collection><collection>Agriculture Science Database</collection><collection>Health &amp; Medical Collection (Alumni Edition)</collection><collection>Medical Database</collection><collection>ProQuest advanced technologies &amp; aerospace journals</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Biotechnology and BioEngineering Abstracts</collection><collection>Publicly Available Content (ProQuest)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Genetics Abstracts</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>TheScientificWorld</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lu, Yang</au><au>Li, Jiguo</au><au>Cao, Tianjie</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks</atitle><jtitle>TheScientificWorld</jtitle><addtitle>ScientificWorldJournal</addtitle><date>2014-01-01</date><risdate>2014</risdate><volume>2014</volume><issue>2014</issue><spage>1</spage><epage>12</epage><pages>1-12</pages><issn>2356-6140</issn><issn>1537-744X</issn><eissn>1537-744X</eissn><abstract>Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><pmid>24959606</pmid><doi>10.1155/2014/295419</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0003-4860-8384</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2356-6140
ispartof TheScientificWorld, 2014-01, Vol.2014 (2014), p.1-12
issn 2356-6140
1537-744X
1537-744X
language eng
recordid cdi_doaj_primary_oai_doaj_org_article_7658fe623bf24f5b91cf10c3a259988d
source Wiley Online Library Open Access; Publicly Available Content (ProQuest); PubMed Central
subjects Access to Information
Algorithms
Analysis
Computer Security
Confidentiality
Cryptography
Cybersecurity
Data encryption
Models, Theoretical
Network security
Public key encryption
Public Key Infrastructure
title Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T02%3A03%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Efficient%20Certificate-Based%20Signcryption%20Secure%20against%20Public%20Key%20Replacement%20Attacks%20and%20Insider%20Attacks&rft.jtitle=TheScientificWorld&rft.au=Lu,%20Yang&rft.date=2014-01-01&rft.volume=2014&rft.issue=2014&rft.spage=1&rft.epage=12&rft.pages=1-12&rft.issn=2356-6140&rft.eissn=1537-744X&rft_id=info:doi/10.1155/2014/295419&rft_dat=%3Cgale_doaj_%3EA413711001%3C/gale_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c572t-7c38c9b62abf84ac23f3e8f4d839991f07d061a14f29c385f7dc4de7e46bdf9c3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1547777883&rft_id=info:pmid/24959606&rft_galeid=A413711001&rfr_iscdi=true