An efficient anonymous certificateless proxy signcryption scheme without bilinear pairings over elliptic curves
Abstract
In real-world applications, anonymity, confidentiality, and unforgeability play pivotal roles in secure communication, especially in the scenarios where privacy and security are dominant concerns. The novel paradigm of certificateless anonymous proxy signcryption introduced in this work allows the original signer to expose the proxy signer’s identity if it is misused, while simultaneously granting anonymity to the proxy signer. We design a CL-APSC mechanism and it’s security is proven by using the Diffie-Hellman and discrete logarithm problem in the elliptic curve. Additionally, we provide a security model and a formal definition of the certificateless anonymous proxy signcryption (CL-APSC) technique. Since the proposed approach operates in a certificateless environment, it eliminates the overhead of maintaining certificates and avoids the key escrow problem. Our aim in this article is to reduce the computational cost with the existing schemes and also provides anonymity to the proxy identity.
Downloads
References
Zheng. Y.,Digital signcryption or how to achieve cost(signature encryption, in Proceedings of the cost(signature) + cost(encryption), in Advances in Cryptology - CRYPTO 97, 165-179, (1997).
Saraswat, Vishal, Sahu, Rajeev Anand and Awasthi, Amit. K.,A secure anonymous proxy signcryption scheme, Journal of Mathematical Cryptology, 11(2), 63-84, (2017).
Padmalaya Nayak, Swapna. G., Security issues in IoT applications using certificateless aggregate signcryption schemes: An overview, Internet of Things, 21, (2023).
Mambo. M, Usuda. K and Okamoto. E., Proxy signatures: Delegation of the power to sign messages, IEICE Trans. Fundam. Electron. Comm. Comput. Sci., 79(9), 1338–1354, (1996).
Gamage. C, Leiwo. J, and Zheng. Y., An efficient scheme for secure mesasage transmission using proxy-signcryption, Proc. 22nd Australasim Comput. Sci. Conf., Auckland, New Zealand: Springer-Verlag, 420–431, (1999).
Baek. J, Newmarch. J, Safavi-Naini. R and Susilo. W., A Survey of Identity-Based Cryptography, Proc. of the 10th Annual Conference for Australian Unix User’s Group, 95-102, (2004).
Malone. J Lee., Identity based Signcryption, Cryptology e-Print Archive, Report 2002/098, (2002).
Barbosa. M and Farshim. P., Certificateless signcryption, Proc. ACM Symp. Inf., Comput. Commun., New York, NY, USA, 369–372, (2008).
Yanfeng. Q, Chunming. T, Yu L, Maozhi X, Baoan. G., Certificateless proxy identity-based signcryption scheme without bilinear pairings, China Commun 10(11), 37–41, (2013).
Bhatia. T and Verma. A. K.,Cryptanalysis and improvement of certifcateless proxy signcryption scheme for eprescription system in mobile cloud computing, Annals of Telecommunications-Annales des Telecommunications, 72, (9-10), 563–576, (2017).
Li, Li, Zhou. S, Choo K. K. R, Li, X, He, D., An Efficient and Provably Secure Certificateless Proxy Signcryption Scheme for Electronic Prescription System, Secur. Commun. Netw. 95, 541-549, (2018).
H. Yu and Wang. Z.,Construction of Certificateless Proxy Signcryption Scheme From CMGs, IEEE Access, 7, 141910-141919, (2019).
Khan, M.A, Alhakami. H, Ullah. I, Alhakami, W, Mohsan. S.A.H, Tariq. U, Innab. N. A ., Resource Friendly Certificateless Proxy Signcryption Scheme for Drones in Networks beyond 5G, Drones 7, 321, (2023).
Ren. K, Lou. W, Zeng. K, Moran. P., On Broadcast Authentication in Wireless Sensor Networks, IEEE Trans. Wireless Commun. 6, 4136–4144, (2007).
Cao, Kou. W, Du. X., A Pairing-free Identity-based Authenticated Key Agreement Protocol with Minimal Message Exchanges, Inform. Sci. 180, 2895–2903, (2010).
Tan. S. Y, S.-H. Heng, B.-M. Goi., Java Implementation for Pairing-Based Cryptosystems, Computational Science and Its Applications – ICCSA, 188–198, (2010).
Copyright (c) 2026 Boletim da Sociedade Paranaense de Matemática

This work is licensed under a Creative Commons Attribution 4.0 International License.
When the manuscript is accepted for publication, the authors agree automatically to transfer the copyright to the (SPM).
The journal utilize the Creative Common Attribution (CC-BY 4.0).



