Improved Cryptanalysis of Provable Certificateless Generalized Signcryption
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 4
Abstract
Certificateless generalized signcryption adaptively work as certificateless signcryption, signature or encryption scheme having single algorithm for suitable storage-constrained environments. Recently, Zhou et al. proposed a novel Certificates generalized scheme, and proved its ciphertext indistinguishability under adaptive chosen ciphertext attacks (IND-CCA2) using Gap Bi-linear Diffie-Hellman and Computational Diffie-Hellman assumption as well as proved existential unforgeability against chosen message attacks (EUF-CMA) using the Gap Bi-linear Diffie-Hellman and Computational Diffie-Hellman assumption in random oracle model. In this paper, we analyzed Zhou et al. scheme and unfortunately proved IND-CCA2 insecure in encryption and signcryption modes in defined security model. We also present a practical and improved scheme, provable secure in random oracle model.
Authors and Affiliations
Abdul Waheed, Jawaid Iqbal, Nizamud Din, Shahab Ul Islam, Arif Iqbal Umar, Noor ul Amin
A Classification Model for Imbalanced Medical Data based on PCA and Farther Distance based Synthetic Minority Oversampling Technique
Medical data are extensively used in the diagnosis of human health. So it has played a vital role for physicians as well as in medical engineering. Accordingly, many types of research are going on related to this to have...
Speech Impairments in Intellectual Disability: An Acoustic Study
Speech is the primary means of human communication. Speech production starts in early ages and matures as children grow. People with intellectual or learning disabilities have deficit in speech production and faces diffi...
Iris Recognition Using Modified Fuzzy Hypersphere Neural Network with different Distance Measures
In this paper we describe Iris recognition using Modified Fuzzy Hypersphere Neural Network (MFHSNN) with its learning algorithm, which is an extension of Fuzzy Hypersphere Neural Network (FHSNN) proposed by Kulkarni et...
Watermarking Digital Image Using Fuzzy Matrix Compositions and Rough Set
Watermarking is done in digital images for authentication and to restrict its unauthorized usages. Watermarking is sometimes invisible and can be extracted only by authenticated party. Encrypt a text or information by pu...
Ensemble and Deep-Learning Methods for Two-Class and Multi-Attack Anomaly Intrusion Detection: An Empirical Study
Cyber-security, as an emerging field of research, involves the development and management of techniques and technologies for protection of data, information and devices. Protection of network devices from attacks, threat...