25
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

      , , ,
      Security and Communication Networks
      Hindawi Limited

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Generalized signcryption (GSC) can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH) assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL) assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

          Related collections

          Most cited references31

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          Identity-Based Cryptosystems and Signature Schemes

          Adi Shamir (1985)
            Bookmark
            • Record: found
            • Abstract: not found
            • Book Chapter: not found

            Certificateless Public Key Cryptography

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Identity-based key agreement protocols from pairings

                Bookmark

                Author and article information

                Journal
                Security and Communication Networks
                Security and Communication Networks
                Hindawi Limited
                1939-0114
                1939-0122
                2017
                2017
                : 2017
                :
                : 1-17
                Article
                10.1155/2017/8405879
                743a1fb4-560a-4b1f-a9a9-ed008670eccc
                © 2017

                http://creativecommons.org/licenses/by/4.0/

                History

                Comments

                Comment on this article