Loading…
Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks
Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultan...
Saved in:
Published in: | TheScientificWorld 2014-01, Vol.2014 (2014), p.1-12 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c572t-7c38c9b62abf84ac23f3e8f4d839991f07d061a14f29c385f7dc4de7e46bdf9c3 |
---|---|
cites | cdi_FETCH-LOGICAL-c572t-7c38c9b62abf84ac23f3e8f4d839991f07d061a14f29c385f7dc4de7e46bdf9c3 |
container_end_page | 12 |
container_issue | 2014 |
container_start_page | 1 |
container_title | TheScientificWorld |
container_volume | 2014 |
creator | Lu, Yang Li, Jiguo |
description | Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature. |
doi_str_mv | 10.1155/2014/295419 |
format | article |
fullrecord | <record><control><sourceid>gale_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_7658fe623bf24f5b91cf10c3a259988d</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A413711001</galeid><doaj_id>oai_doaj_org_article_7658fe623bf24f5b91cf10c3a259988d</doaj_id><sourcerecordid>A413711001</sourcerecordid><originalsourceid>FETCH-LOGICAL-c572t-7c38c9b62abf84ac23f3e8f4d839991f07d061a14f29c385f7dc4de7e46bdf9c3</originalsourceid><addsrcrecordid>eNqNks9rFDEUgAdR7Fo9eZcBL6JMm5-TyUVYl6qLBcUqeAuZ5GWadTazJjPK_vdmO21pPZkcQl6-9yUvvKJ4jtEJxpyfEoTZKZGcYfmgWGBORSUY-_GwWBDK66rGDB0VT1LaIEQbgfnj4ogwyWWN6kWxOXPOGw9hLFcQR583eoTqnU5gywvfBRP3u9EPobwAM0Uodad9SGP5ZWp7b8pPsC-_wq7XBrYHyXIctfmZSh1suQ7JW4g3safFI6f7BM-u1-Pi-_uzb6uP1fnnD-vV8rwyXJCxEoY2RrY10a1rmDaEOgqNY7ahUkrskLCoxhozR2RGuRPWMAsCWN1al0PHxXr22kFv1C76rY57NWivrgJD7JTOlZoelKh546AmtHWEOd5KbBxGhmrCpWwam11vZ9duardgTS4x6v6e9P5J8JeqG34rhjgRDc2CV9eCOPyaII1q65OBvtcBhikpzBnCmEjKMvryH3QzTDHkrzpQIo_mSngyU53OBfjghnyvydPC1pshgPM5vmSYCowRwjnhzZxg4pBSBHf7eozUoYHUoYHU3ECZfnG34Fv2pmMy8HoGLn2w-o__PxtkBJy-AzOZafoXFMzXiw</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1547777883</pqid></control><display><type>article</type><title>Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks</title><source>Wiley Online Library Open Access</source><source>Publicly Available Content (ProQuest)</source><source>PubMed Central</source><creator>Lu, Yang ; Li, Jiguo</creator><contributor>Cao, Tianjie</contributor><creatorcontrib>Lu, Yang ; Li, Jiguo ; Cao, Tianjie</creatorcontrib><description>Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.</description><identifier>ISSN: 2356-6140</identifier><identifier>ISSN: 1537-744X</identifier><identifier>EISSN: 1537-744X</identifier><identifier>DOI: 10.1155/2014/295419</identifier><identifier>PMID: 24959606</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Access to Information ; Algorithms ; Analysis ; Computer Security ; Confidentiality ; Cryptography ; Cybersecurity ; Data encryption ; Models, Theoretical ; Network security ; Public key encryption ; Public Key Infrastructure</subject><ispartof>TheScientificWorld, 2014-01, Vol.2014 (2014), p.1-12</ispartof><rights>Copyright © 2014 Yang Lu and Jiguo Li.</rights><rights>COPYRIGHT 2014 John Wiley & Sons, Inc.</rights><rights>Copyright © 2014 Yang Lu and Jiguo Li. Yang Lu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</rights><rights>Copyright © 2014 Y. Lu and J. Li. 2014</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c572t-7c38c9b62abf84ac23f3e8f4d839991f07d061a14f29c385f7dc4de7e46bdf9c3</citedby><cites>FETCH-LOGICAL-c572t-7c38c9b62abf84ac23f3e8f4d839991f07d061a14f29c385f7dc4de7e46bdf9c3</cites><orcidid>0000-0003-4860-8384</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/1547777883/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/1547777883?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>230,314,723,776,780,881,25732,27903,27904,36991,36992,44569,53769,53771,74872</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/24959606$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><contributor>Cao, Tianjie</contributor><creatorcontrib>Lu, Yang</creatorcontrib><creatorcontrib>Li, Jiguo</creatorcontrib><title>Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks</title><title>TheScientificWorld</title><addtitle>ScientificWorldJournal</addtitle><description>Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.</description><subject>Access to Information</subject><subject>Algorithms</subject><subject>Analysis</subject><subject>Computer Security</subject><subject>Confidentiality</subject><subject>Cryptography</subject><subject>Cybersecurity</subject><subject>Data encryption</subject><subject>Models, Theoretical</subject><subject>Network security</subject><subject>Public key encryption</subject><subject>Public Key Infrastructure</subject><issn>2356-6140</issn><issn>1537-744X</issn><issn>1537-744X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNqNks9rFDEUgAdR7Fo9eZcBL6JMm5-TyUVYl6qLBcUqeAuZ5GWadTazJjPK_vdmO21pPZkcQl6-9yUvvKJ4jtEJxpyfEoTZKZGcYfmgWGBORSUY-_GwWBDK66rGDB0VT1LaIEQbgfnj4ogwyWWN6kWxOXPOGw9hLFcQR583eoTqnU5gywvfBRP3u9EPobwAM0Uodad9SGP5ZWp7b8pPsC-_wq7XBrYHyXIctfmZSh1suQ7JW4g3safFI6f7BM-u1-Pi-_uzb6uP1fnnD-vV8rwyXJCxEoY2RrY10a1rmDaEOgqNY7ahUkrskLCoxhozR2RGuRPWMAsCWN1al0PHxXr22kFv1C76rY57NWivrgJD7JTOlZoelKh546AmtHWEOd5KbBxGhmrCpWwam11vZ9duardgTS4x6v6e9P5J8JeqG34rhjgRDc2CV9eCOPyaII1q65OBvtcBhikpzBnCmEjKMvryH3QzTDHkrzpQIo_mSngyU53OBfjghnyvydPC1pshgPM5vmSYCowRwjnhzZxg4pBSBHf7eozUoYHUoYHU3ECZfnG34Fv2pmMy8HoGLn2w-o__PxtkBJy-AzOZafoXFMzXiw</recordid><startdate>20140101</startdate><enddate>20140101</enddate><creator>Lu, Yang</creator><creator>Li, Jiguo</creator><general>Hindawi Publishing Corporation</general><general>John Wiley & Sons, Inc</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>CGR</scope><scope>CUY</scope><scope>CVF</scope><scope>ECM</scope><scope>EIF</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7QP</scope><scope>7TK</scope><scope>7TM</scope><scope>7X2</scope><scope>7X7</scope><scope>7XB</scope><scope>88E</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FH</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AEUYN</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>ATCPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BHPHI</scope><scope>CCPQU</scope><scope>CWDGH</scope><scope>DWQXO</scope><scope>FR3</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>HCIFZ</scope><scope>K9.</scope><scope>M0K</scope><scope>M0S</scope><scope>M1P</scope><scope>P5Z</scope><scope>P62</scope><scope>P64</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>RC3</scope><scope>7X8</scope><scope>5PM</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-4860-8384</orcidid></search><sort><creationdate>20140101</creationdate><title>Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks</title><author>Lu, Yang ; Li, Jiguo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c572t-7c38c9b62abf84ac23f3e8f4d839991f07d061a14f29c385f7dc4de7e46bdf9c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Access to Information</topic><topic>Algorithms</topic><topic>Analysis</topic><topic>Computer Security</topic><topic>Confidentiality</topic><topic>Cryptography</topic><topic>Cybersecurity</topic><topic>Data encryption</topic><topic>Models, Theoretical</topic><topic>Network security</topic><topic>Public key encryption</topic><topic>Public Key Infrastructure</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lu, Yang</creatorcontrib><creatorcontrib>Li, Jiguo</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>Medline</collection><collection>MEDLINE</collection><collection>MEDLINE (Ovid)</collection><collection>MEDLINE</collection><collection>MEDLINE</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Calcium & Calcified Tissue Abstracts</collection><collection>Neurosciences Abstracts</collection><collection>Nucleic Acids Abstracts</collection><collection>Agricultural Science Collection</collection><collection>ProQuest Health & Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Medical Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Natural Science Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest One Sustainability</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>Agricultural & Environmental Science Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest Natural Science Collection</collection><collection>ProQuest One Community College</collection><collection>Middle East & Africa Database</collection><collection>ProQuest Central</collection><collection>Engineering Research Database</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Health & Medical Complete (Alumni)</collection><collection>Agriculture Science Database</collection><collection>Health & Medical Collection (Alumni Edition)</collection><collection>Medical Database</collection><collection>ProQuest advanced technologies & aerospace journals</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Biotechnology and BioEngineering Abstracts</collection><collection>Publicly Available Content (ProQuest)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Genetics Abstracts</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>TheScientificWorld</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lu, Yang</au><au>Li, Jiguo</au><au>Cao, Tianjie</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks</atitle><jtitle>TheScientificWorld</jtitle><addtitle>ScientificWorldJournal</addtitle><date>2014-01-01</date><risdate>2014</risdate><volume>2014</volume><issue>2014</issue><spage>1</spage><epage>12</epage><pages>1-12</pages><issn>2356-6140</issn><issn>1537-744X</issn><eissn>1537-744X</eissn><abstract>Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><pmid>24959606</pmid><doi>10.1155/2014/295419</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0003-4860-8384</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2356-6140 |
ispartof | TheScientificWorld, 2014-01, Vol.2014 (2014), p.1-12 |
issn | 2356-6140 1537-744X 1537-744X |
language | eng |
recordid | cdi_doaj_primary_oai_doaj_org_article_7658fe623bf24f5b91cf10c3a259988d |
source | Wiley Online Library Open Access; Publicly Available Content (ProQuest); PubMed Central |
subjects | Access to Information Algorithms Analysis Computer Security Confidentiality Cryptography Cybersecurity Data encryption Models, Theoretical Network security Public key encryption Public Key Infrastructure |
title | Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T02%3A03%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Efficient%20Certificate-Based%20Signcryption%20Secure%20against%20Public%20Key%20Replacement%20Attacks%20and%20Insider%20Attacks&rft.jtitle=TheScientificWorld&rft.au=Lu,%20Yang&rft.date=2014-01-01&rft.volume=2014&rft.issue=2014&rft.spage=1&rft.epage=12&rft.pages=1-12&rft.issn=2356-6140&rft.eissn=1537-744X&rft_id=info:doi/10.1155/2014/295419&rft_dat=%3Cgale_doaj_%3EA413711001%3C/gale_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c572t-7c38c9b62abf84ac23f3e8f4d839991f07d061a14f29c385f7dc4de7e46bdf9c3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1547777883&rft_id=info:pmid/24959606&rft_galeid=A413711001&rfr_iscdi=true |