In the past studies, it is generally assumed that both sides of communication are in the same environment of public key cryptography, but with the development of technology and the popularity of the network, different regions may have different public key cryptographies. In order to resolve the communication security problem between heterogeneous systems, two signcryption schemes are proposed, which are used to achieve the communication security between the Public Key Infrastructure (PKI) and CertificatLess public key Cryptography (CLC) under heterogeneous systems. It is proved that the schemes have INDistinguishability against Adaptive Chosen Ciphertext Attacks (IND-CCA2) under Bilinear Diffie-Hellman Problem (BDHP) and Existential UnForgeability against adaptive Chosen Messages Attacks (EUF-CMA) under the Computational Diffie-Hellman Problem (CDHP) in the random oracle model.
SHAMIR A. Identity-based cryptosystem and signature scheme [C]. Proceedings of CRYPTO 84 on Advances in cryptology, New York, NY, USA, 1984, 196: 47-53. doi: 10.1007/3-540-39568-7_5 .
[2]
AL-RIYAMI S S and PATERSON K G. Certificateless public key cryptography[C]. International Conference on the Theory and Application of Cryptology and Information Security, Taipei, China, 2003: 452-473. doi: 10.1007/978-3-540-40061- 5_29.
[3]
ZHENG Yuliang. Digital signcryption or how to achieve cost (signature & encryption)<<cost (signature) +cost (encryption)[C]. Proceedings of the Cryptology- Crypto 1997, California, USA, 1997: 165-179. doi: 10.1007/ BFb0052234
[4]
BAEK J, STEINFELD R, and ZHENG Yuliang. Formal proofs for the security of signcryption[C]. Proceedings of the Cryptology PKC2002, Paris, France, 2002: 81-98. doi: 10.1007/3-540-45664-3_6.
[5]
CH A S, UDDIN N, SHER M, et al. An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography?[J]. Multimedia Tools and Applications, 2015, 74(5): 1711-1723. doi: 10.1007/s11042- 014-2283-9.
[6]
LI C K, YANG G, WONG D S, et al. An efficient signcryption scheme with key privacy[C]. Proceedings of the 4th European Public Key Infrastructure Workshop (EuroPKI 2007), Palma de Mallorca, Spain, 2007, 4582: 78-93. doi: 10. 1007/978-3-540-73408-6_6.
[7]
QIN Bo, WANG Huaqun, WU Qianhong, et al. An simultaneous authentication and secrecy in identity-based data upload to cloud[J]. Cluster Computing, 2013, 16(4): 845-859. doi: 10.1007/s10586-013-0258-7.
[8]
PANG Liaojun, GAO Lu, LI Huixian, et al. Anonymous multi-receiver ID-based signcryption scheme[J]. Information Security, 2015, 9(3): 193-201. doi: 10.1049/iet-ifs.2014.0360.
[9]
BARBOSA M and FARSHIM P. Certificateless signcryption [C]. Proceedings of the ASIACCS2008, New York, USA, 2008: 369-372. doi: 10.1145/1368310.1368364.
ZHANG Yulei, WANG Huan, LI Chenyi, et al. Provable secure and compact certificateless aggregate signcryption scheme[J]. Journal of Electronics & Information Technology, 2015, 37(12): 2839-2844. doi: 10.11999/JEIT150407.
SUN Yinxia, LI Hui, and LI Xiaoqing. Certificateless signcryption KEM to multiple recipients[J]. Journal of Electronics & Information Technology, 2010, 32(9): 2249-2252. doi: 10.3724/SP.J.1146.2009.01260.
GE Aijun and CHEN Shaozhen. Strongly secure certificateless signature scheme without pairings[J]. Journal of Electronics & Information Technology, 2010, 32(7): 1766-1768. doi: 10.3724/SP.J.1146.2009.00965.
[13]
ESLAMI Z and PAKNIAT N. Certificateless aggregate signcryption: security model and a concrete construction secure in the random oracle model[J]. Journal of King Saud University-Computer and Information Sciences, 2014, 26(3): 276-286. doi: 10.1016/j.jksuci.2014.03.006.
[14]
YIN A and LIANG H. Certificateless hybrid signcryption scheme for secure sommunication of wireless sensor networks [J]. Wireless Personal Communications, 2015, 80(3): 1049-1062. doi: 10.1007/s11277-014-2070-y.10.
[15]
HAFIZUL ISLAM S K and LI Fagen. Leakage-free and provably secure certificateless signcryption scheme using bilinear pairings[J]. The Computer Journal, 2015, 58(10): 2636-2648. doi: 10.1093/comjnl/bxv002.
[16]
SUN Yinxia and LI Hui. Eifficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Secience China Information Sciences, 2010, 53(3): 557-566. doi: 10.1007/s11432-010-0061-5.
[17]
HUANG Q, WONG D S, and YANG G. Heterogeneous signcryption with key privacy[J]. Computer Journal, 2011, 54(4): 525-536. doi: 10.1093/comjnl/bxq095.
[18]
LI Fagen, ZHANG Hui, and TAKAGI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420-429. doi: 1109/JSYST.2012. 2221897.
YU Huifang and YANG Bo. Provably secure certificateless hybrid signcryption[J]. Chinese Journal of Computers, 2015, 38(4): 805-813. doi: 10.3724/SP.J.1016.2015.00804.