Visible to the public Security Analysis of a Certificateless Signcryption Mechanism without Bilinear Mapping

TitleSecurity Analysis of a Certificateless Signcryption Mechanism without Bilinear Mapping
Publication TypeConference Paper
Year of Publication2020
AuthorsYang, Xiaodong, Liu, Rui, Chen, Guilan, Wang, Meiding, Wang, Caifen
Conference Name2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)
KeywordsBilinear Pairing, certificateless signcryption, composability, Computational modeling, computer security, Human Behavior, Metrics, pubcrawl, public key cryptography, random oracle model, Receivers, Repudiation, resilience, Resiliency, unforgeability
AbstractCertificateless signcryption mechanism can not only provide security services, such as message integrity, non-repudiation and confidentiality, but also solve the problems of public key certificate management and key escrow. Zhou et al. proposed a certificateless signcryption mechanism without bilinear mapping and gave its security proof under the discrete logarithm problem and the computational Diffie Hellman problem in the random oracle model. However, the analysis show that this scheme has security flaws. That is, attackers can forge legitimate signatures of any messages. Finally, we give the specific attack process.
DOI10.1109/ITNEC48623.2020.9084684
Citation Keyyang_security_2020