Implementation of Certificateless Signcryption Based On Elliptic Curve Using Javascript

Abdul Wahid, Masahiro Mambo

Abstract


Certificateless Cryptography (CLC) provides a new approach in addressing problems in encryption techniques. In CLC, any string can be used as a public key so that the data can be secured without using a certificate. In addition, the CLC concept makes it possible for the revocation of keys with a certain time limit. Another emerging concept is the signcryption which is a cryptographic system that combines the digital signature system and encryption system into one logical step thus requiring a smaller computational cost compared to the regular signature-then-encryption system. Elliptic Curve Cryptography (ECC) is a cryptography that uses elliptic curve which offers the same security but with smaller key sizes thus requiring less memory and computation. In this paper, we attempted to combine the three concepts to obtain all the advantages possessed by each concept without compromising system security. In the implementation we used client-based programming namely javascript which can reduce the workload of the server in order to achieve system security. We compared the computational cost of our scheme with some previous schemes and analyzed the security property of our scheme.

Keywords


Certificateless Cryptography; Elliptic Curve Cryptography; Signcryption; Protocol; Javascript

Full Text:

PDF

References


S. William, Cryptography and Network Security, vol. 139, no. 3. Boston, USA.: Prentice Hall, 2011.

R.-J. Hwang, C.-H. Lai, and F.-F. Su, “An efficient signcryption scheme with forward secrecy based on elliptic curve,” Appl. Math. Comput., vol. 167, pp. 870–881, 2005.

Y. Zheng, “Digital signcryption or how to achieve cost (signature & encryption) cost (signature)+ cost (encryption),” Adv. Cryptol. — Crypto ’97, no. March, pp. 165–179, 1997.

A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology-CRYPTO’84, 1984, pp. 47–53.

D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” SIAM J. Comput., vol. 32, no. 3, pp. 586–615, 2003.

S. Al-Riyami and K. Paterson, “Certificateless public key cryptography,” Adv. Cryptology-ASIACRYPT 2003, pp. 1–40, 2003.

Y. Zheng and H. Imai, “How to construct efficient signcryption schemes on elliptic curves,” Inf. Process. Lett., vol. 68, no. 5, pp. 227–233, 1998.

J. Baek, R. Steinfeld, and Y. Zheng, “Formal proofs for the security of signcryption,” J. Cryptol., vol. 20, no. 2, pp. 203–235, 2007.

R. Steinfeld and Y. Zheng, “A Signcryption Scheme Based on Integer Factorization,” Inf. Secur. LNCS, vol. 1975, pp. 308–322, 2000.

J. Malone-Lee, “Identity-Based Signcryption,” IACR Cryptology ePrint Archive. pp. 1–8, 2002.

Y. Yu, B. Yang, Y. Sun, and S. lin Zhu, “Identity based signcryption scheme without random oracles,” Comput. Stand. Interfaces, vol. 31, no. 1, pp. 56–62, 2009.

Z. Jin, Q. Wen, and H. Du, “An improved semantically-secure identity-based signcryption scheme in the standard model,” Comput. Electr. Eng., vol. 36, no. 3, pp. 545–552, 2010.

M. Barbosa and P. Farshim, “Certificateless Signcryption,” ACM Symp. Information, Comput. Commun. Secur., pp. 369–372, 2008.

X. Zheng and X. Yang, “Improvement of a Certificate less Signcryption Scheme without pairing,” Int. J. Sci., vol. 2, no. 7, pp. 81–87, 2015.

S. Wenbo, K. Neeraj, G. Peng, and Z. Zezhong, “Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing,” Front. Comput. Sci., vol. 8, no. 4, pp. 656–666, 2014.

S. Seo and E. Bertino, “Elliptic Curve Cryptography based Certificateless Hybrid Signcryption Scheme without Pairing,” CERIAS Tech Rep. 2013-10, 2013.

J. Won, S.-H. Seo, and E. Bertino, “A Secure Communication Protocol for Drones and Smart Objects,” in ASIA CCS’15, 2015, pp. 249–260.

B. Al-ja, M. Alhammouri, and Q. Abuein, “Id - Based Mutual Authentication with Signcryption Scheme for Mobile Devices,” in International Conference on Computer Science and Information Systems (ICSIS’2014), 2014, pp. 44–53.




DOI: http://dx.doi.org/10.19732/10.19732/vol1122016

Refbacks

  • There are currently no refbacks.


Copyright (c) 2016 International Journal of Computing and Informatics (IJCANDI)

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.


International Journal of Computing and Informatics (eISSN: 2502-2334)
Organized by Universitas Mulawarman, Universiti Malaysia Sabah, Universitas Muslim Indonesia
Published by Universitas Mulawarman 
W : http://ijcandi.org
E  : ijcandi@unmul.ac.id or haviluddin.ijcandi@gmail.com

Creative Commons License
IJCANDI is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

View My Stats