Skip to main content

A Secure Encryption Scheme Based on Certificateless Proxy Signature

  • Conference paper
  • First Online:
Advances in Big Data and Cloud Computing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 645))

  • 1278 Accesses

Abstract

Certificateless public key cryptography (CL-PKC) scheme is introduced for solving the key escrow problems in the identity-based cryptography and eliminating the use of security certificates. By introducing the proxy signature concept in the certificateless cryptography scheme, this certificateless proxy signature (CLPS) scheme has attracted the attention of more researchers. However, this scheme suffers due to the security issues and fails to achieve the unforgeability against the attacks. To overcome the security issues in the existing cryptographic schemes, this paper proposes an encryption scheme based on the certificateless proxy signature for sharing the sensitive data in the public cloud in a secure manner. The proposed scheme is proven to be unforgeable against the message attacks. When compared with the existing CLPS scheme without random oracles, the proposed scheme offers better data security while ensuring better data sharing performance. From the experimental results, it is noticed that the proposed scheme requires minimum encryption time and decryption time than the existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Xu, L., Wu, X., Zhang, X.: CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 87–88 (2012)

    Google Scholar 

  2. Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: delegation of the power to sign messages. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 79, 1338–1354 (1996)

    Google Scholar 

  3. Wang, L.-L., Chen, K.-F., Mao, X.-P., Wang, Y.-T.: Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing. J. Shanghai Jiaotong Univ. (Sci.) 19, 398–405 (2014)

    Article  Google Scholar 

  4. Qin Z, Wu S, Xiong H.: Strongly secure and cost-effective certificateless proxy re-encryption scheme for data sharing in cloud computing. In: International Conference on Big Data Computing and Communications, pp. 205–216 (2015)

    Google Scholar 

  5. Srinivasan, A., Rangan, C.P.: (2015) Certificateless proxy re-encryption without pairing: revisited. In: Proceedings of the 3rd International Workshop on Security in Cloud Computing, pp. 41–52

    Google Scholar 

  6. Seo, S.-H., Nabeel, M., Ding, X., Bertino, E.: An efficient certificateless encryption for secure data sharing in public clouds. IEEE Trans. Knowl. Data Eng. 26, 2107–2119 (2014)

    Article  Google Scholar 

  7. Xu, P., Xu, J., Wang, W., Jin, H., Susilo, W., Zou, D.: Generally hybrid proxy re-encryption: a secure data sharing among cryptographic clouds. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 913–918 (2016)

    Google Scholar 

  8. Lu, Y., Li, J.: A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds. Future Gener Comput Syst 62, 140–147 (2016)

    Article  Google Scholar 

  9. Sur, C., Park, Y., Shin, S.U., Rhee, K.H., Seo, C.: Certificate-based proxy re-encryption for public cloud storage. In: Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 159–166 (2013)

    Google Scholar 

  10. Lu, Y.: Efficient Certificate-Based Proxy Re-encryption Scheme for Data Sharing in Public Clouds (2015)

    Google Scholar 

  11. Jiang, W.: Parallel certificateless proxy reencryption scheme applicable for cloud storage. J. Comput. Theor. Nanosci. 13, 4515–4520 (2016)

    Article  Google Scholar 

  12. Kumar, A., Mishra, S., Dubey, P., Kumar, N.: Secure data sharing with data integrity in public clouds using mediated certificate-less encryption. In Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing, pp. 501–510 (2016)

    Google Scholar 

  13. Eslami, Z., Pakniat, N.: A certificateless proxy signature scheme secure in standard model. In Proceedings of International Conference on Latest Computational Technologies-ICLCT, pp. 81–84 (2012)

    Google Scholar 

  14. Lu, Y., Li, J.: Provably secure certificateless proxy signature scheme in the standard model. Theore. Comput. Sci. (2016)

    Google Scholar 

  15. Tsai, J.-L.: A new efficient certificateless short signature scheme using bilinear pairings. IEEE Syst. J. (2015)

    Google Scholar 

  16. Choi, K.Y., Park, J.H., Lee, D.H.: A new provably secure certificateless short signature scheme. Comput. Math Appl. 61, 1760–1768 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  17. Chun-Ifan, R.-H.H., Ho, P.-H.: Truly non-repudiation certificateless short signature scheme from bilinear pairings. J. Inf. Sci. Eng. 27, 969–982 (2011)

    Google Scholar 

  18. Tso, R., Huang, X., Susilo, W.: Strongly secure certificateless short signatures. J. Syst. Softw. 85, 1409–1417 (2012)

    Article  Google Scholar 

  19. Chen, Y.-C., Horng, G., Liu, C.-L.: Strong non-repudiation based on certificateless short signatures. IET Inf. Secur. 7, 253–263 (2013)

    Article  Google Scholar 

  20. He, D., Huang, B., Chen, J.: New certificateless short signature scheme. IET Inf. Secur. 7, 113–117 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Sudharani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sudharani, K., Sakthivel, P.N.K. (2018). A Secure Encryption Scheme Based on Certificateless Proxy Signature. In: Rajsingh, E., Veerasamy, J., Alavi, A., Peter, J. (eds) Advances in Big Data and Cloud Computing. Advances in Intelligent Systems and Computing, vol 645. Springer, Singapore. https://doi.org/10.1007/978-981-10-7200-0_25

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7200-0_25

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7199-7

  • Online ISBN: 978-981-10-7200-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics