How to construct efficient signcryption schemes on elliptic curves
Information Processing Letters
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
On the Security of Joint Signature and Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
The random oracle methodology, revisited
Journal of the ACM (JACM)
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Breaking the short certificateless signature scheme
Information Sciences: an International Journal
A New Efficient Certificateless Signcryption Scheme
ISISE '08 Proceedings of the 2008 International Symposium on Information Science and Engieering - Volume 01
A new certificateless aggregate signature scheme
Computer Communications
Certificateless Hybrid Signcryption
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Certificateless Threshold Ring Signature
Information Sciences: an International Journal
Certificateless signcryption scheme in the standard model
Information Sciences: an International Journal
Simulatable certificateless two-party authenticated key agreement protocol
Information Sciences: an International Journal
Efficient many-to-one authentication with certificateless aggregate signatures
Computer Networks: The International Journal of Computer and Telecommunications Networking
Certificateless threshold signature scheme from bilinear maps
Information Sciences: an International Journal
Cryptanalysis of a certificateless signcryption scheme in the standard model
Information Sciences: an International Journal
Certificateless public key encryption: A new generic construction and two pairing-free schemes
Theoretical Computer Science
A new provably secure certificateless short signature scheme
Computers & Mathematics with Applications
Provably-secure electronic cash based on certificateless partially-blind signatures
Electronic Commerce Research and Applications
Improved identity-based signcryption
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Certificateless threshold signature secure in the standard model
Information Sciences: an International Journal
Hi-index | 0.07 |
It would be interesting if a signcryption scheme in the standard model could be made certificateless. One of the interesting attempts is due to Liu et al. [Z. Liu, Y. Hu, X. Zhang, H. Ma, Certificateless signcryption scheme in the standard model, Information Sciences 180 (3) (2010) 452-464]. In this paper, we provide a cryptanalysis on this scheme by depicting two kinds of subtle public key replacement attacks against it. Our analysis reveals that it does not meet the basic requirements of confidentiality and non-repudiation.