Heterogeneous signcryption can ensure the confidentiality, authentication and unforgeability of information transmission of cross cryptograph environment. Through analyzing some existing heterogeneous signcryption schemes, it is found that they can only be applicable to single message of signcryption. In order to improve the efficiency of computation and transmission in heterogeneous systems, a provable multi-message aggregate signcryption is proposed. In the new scheme, the pairing numbers are constant in verification phase, it not depends on the number of signcryption message. Moreover, based on the assumption of q-bilinear Diffie- Hellman inversion issue and Discrete logarithm, in the random oracle model, it is proved that the new scheme satisfies the properties of confidentiality and unforgeability. Furthermore, theoretical analysis and experimental results demonstrate that the computation overhead efficiency of the proposed scheme is better than the existing one.
ZHENG Yuliang. Digital signcryption or how to achieve cost(signature & encryption)<<cost(signature) +cost (encryption)[C]. Proceedings of the Cryptology-CRYPTO, 1997, California, USA, 1997: 165-179. doi: 10.1007/ BFb0052234.
[2]
BAEK J, STEINFELD R, and ZHENG Yuliang. Formal proofs for the security of signcryption[C]. Proceedings of the Cryptology-PKC2002, Paris, France, 2002: 81-98. doi: 10. 1007/3-540-45664-3_6.
[3]
PANG Liaojun, GAO Lu, LI Huixian, et al. Anonymous multi-receiver ID-based signcryption scheme[J]. Iet Information Security, 2015, 9(3): 194-201. doi: 10.1049/ iet-ifs.2014.0360.
[4]
LI Fagen, ZHANG Hui, and TSUYOSHI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420-429. doi: 10.1109/JSYST.2012. 2221897.
ZHANG Xue, JI Huifang, LI Guangsong, et al. Identity-based signcryption cross autonomous domains[J]. Computer Science, 2015, 42(5): 165-168. doi: 10.11896/j.issn.1002-137X. 2015.5.033.
[6]
ZHOU Yanwei, YANG Bo, and ZHANG Wenzheng. Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing[J]. Discrete Applied Mathematics, 2016, 204(C): 185-202. doi: 10.1016/ j.dam.2015.10.018.
[7]
LI Fagen, HAN Yanan, and JIN Chunhua. Practical signcryption for secure communication of wireless sensor networks[J]. Wireless Personal Communications, 2016, 89(4): 1391-1412. doi: 10.1007/s11277-016-3327-4.
[8]
SUN Yinxia and LI Hui. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Sciece China Information Sciences, 2010, 53(3): 557-566. doi: 10.1007/s11432-010-0061-5.
[9]
HUANG Qiong, WONG D S, and YANG Guomin. Heterogeneous signcryption with key privacy[J]. Computer Journal, 2011, 54(4): 525-536. doi: 10.1093/comjnl/bxq095.
ZHANG Yulei, WANG Huan, LI Chenyi, et al. Provable secure and compact certificateless aggregate signcryption scheme[J]. Journal of Electronics & Information Technology, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
[11]
WANG Hao, LIU Zhen, LIU Zhe, et al. Identity-based aggregate signcryption in the standard model from multilinear maps[J]. Frontiers of Computer Science, 2016, 10(4): 741-754. doi: 10.1007/s11704-015-5138-2.
[12]
HAN Yiliang and CHEN Fei. The multilinear maps based certificateless aggregate signcryption scheme[C]. IEEE International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Xi’an, China, 2015: 92-99. doi: 10.1109/CyberC.2015.93.
[13]
ESLAMI Z and PAKNIAT N. Certificateless aggregate signcryption[J]. Journal of King Saud University-Computer and Information Sciences, 2014, 26(3): 276-286. doi: 10. 1016/j.jksuci.2014.03.006.
[14]
CHEN Juqin and REN Xiaoxi. A privacy protection scheme based on certificateless aggregate signcryption and masking random number in smart grid[C]. International Conference on Mechanical Materials and Manufacturing Engineering, Wuhan, China, 2016: 10-13. doi: 10.2991/mmme-16.2016.3.
[15]
DAVID P and JACQUES S. Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000, 13(3): 361-396. doi: 10.1007=s001450010003.
[16]
The pairing-based cryptography library[OL]. http://crypto. stanford.edu/pbc/, 2015.