|
|
Mutual Signcryption Schemes under Heterogeneous Systems |
LIU Jingwei ZHANG Lihuan SUN Rong |
(State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an 710071, China) |
|
|
Abstract In the past studies, it is generally assumed that both sides of communication are in the same environment of public key cryptography, but with the development of technology and the popularity of the network, different regions may have different public key cryptographies. In order to resolve the communication security problem between heterogeneous systems, two signcryption schemes are proposed, which are used to achieve the communication security between the Public Key Infrastructure (PKI) and CertificatLess public key Cryptography (CLC) under heterogeneous systems. It is proved that the schemes have INDistinguishability against Adaptive Chosen Ciphertext Attacks (IND-CCA2) under Bilinear Diffie-Hellman Problem (BDHP) and Existential UnForgeability against adaptive Chosen Messages Attacks (EUF-CMA) under the Computational Diffie-Hellman Problem (CDHP) in the random oracle model.
|
Received: 13 January 2016
Published: 01 September 2016
|
|
Fund: The Natural Science Basic Research Plan in Shaanxi Province of China (2016JM6057), The National Science and Technology Major Project of the Ministry of Science and Technology of China (2013ZX03005007), The 111 Project (B08038) |
Corresponding Authors:
LIU Jingwei
E-mail: jwliu@mail.xidian.edu.cn
|
|
|
|
[1] |
SHAMIR A. Identity-based cryptosystem and signature scheme [C]. Proceedings of CRYPTO 84 on Advances in cryptology, New York, NY, USA, 1984, 196: 47-53. doi: 10.1007/3-540-39568-7_5 .
|
[2] |
AL-RIYAMI S S and PATERSON K G. Certificateless public key cryptography[C]. International Conference on the Theory and Application of Cryptology and Information Security, Taipei, China, 2003: 452-473. doi: 10.1007/978-3-540-40061- 5_29.
|
[3] |
ZHENG Yuliang. Digital signcryption or how to achieve cost (signature & encryption)<<cost (signature) +cost (encryption)[C]. Proceedings of the Cryptology- Crypto 1997, California, USA, 1997: 165-179. doi: 10.1007/ BFb0052234
|
[4] |
BAEK J, STEINFELD R, and ZHENG Yuliang. Formal proofs for the security of signcryption[C]. Proceedings of the Cryptology PKC2002, Paris, France, 2002: 81-98. doi: 10.1007/3-540-45664-3_6.
|
[5] |
CH A S, UDDIN N, SHER M, et al. An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography?[J]. Multimedia Tools and Applications, 2015, 74(5): 1711-1723. doi: 10.1007/s11042- 014-2283-9.
|
[6] |
LI C K, YANG G, WONG D S, et al. An efficient signcryption scheme with key privacy[C]. Proceedings of the 4th European Public Key Infrastructure Workshop (EuroPKI 2007), Palma de Mallorca, Spain, 2007, 4582: 78-93. doi: 10. 1007/978-3-540-73408-6_6.
|
[7] |
QIN Bo, WANG Huaqun, WU Qianhong, et al. An simultaneous authentication and secrecy in identity-based data upload to cloud[J]. Cluster Computing, 2013, 16(4): 845-859. doi: 10.1007/s10586-013-0258-7.
|
[8] |
PANG Liaojun, GAO Lu, LI Huixian, et al. Anonymous multi-receiver ID-based signcryption scheme[J]. Information Security, 2015, 9(3): 193-201. doi: 10.1049/iet-ifs.2014.0360.
|
[9] |
BARBOSA M and FARSHIM P. Certificateless signcryption [C]. Proceedings of the ASIACCS2008, New York, USA, 2008: 369-372. doi: 10.1145/1368310.1368364.
|
[10] |
张玉磊, 王欢, 李臣意, 等. 可证安全的紧致无证书聚合签密方案[J]. 电子与信息学报, 2015, 37(12): 2839-2844. doi: 10.11999/JEIT150407.
|
|
ZHANG Yulei, WANG Huan, LI Chenyi, et al. Provable secure and compact certificateless aggregate signcryption scheme[J]. Journal of Electronics & Information Technology, 2015, 37(12): 2839-2844. doi: 10.11999/JEIT150407.
|
[11] |
孙银霞, 李晖, 李小青. 无证书体制下的多接收者签密密钥封装机制[J]. 电子与信息学报, 2010, 32(9): 2249-2252. doi: 10.3724/SP. J.1146.2009.01260.
|
|
SUN Yinxia, LI Hui, and LI Xiaoqing. Certificateless signcryption KEM to multiple recipients[J]. Journal of Electronics & Information Technology, 2010, 32(9): 2249-2252. doi: 10.3724/SP.J.1146.2009.01260.
|
[12] |
葛爱军, 陈少真. 具有强安全性的不含双线性对的无证书签名方案[J]. 电子与信息学报, 2010, 32(7): 1766-1768. doi: 10.3724/SP.J.1146.2009.00965.
|
|
GE Aijun and CHEN Shaozhen. Strongly secure certificateless signature scheme without pairings[J]. Journal of Electronics & Information Technology, 2010, 32(7): 1766-1768. doi: 10.3724/SP.J.1146.2009.00965.
|
[13] |
ESLAMI Z and PAKNIAT N. Certificateless aggregate signcryption: security model and a concrete construction secure in the random oracle model[J]. Journal of King Saud University-Computer and Information Sciences, 2014, 26(3): 276-286. doi: 10.1016/j.jksuci.2014.03.006.
|
[14] |
YIN A and LIANG H. Certificateless hybrid signcryption scheme for secure sommunication of wireless sensor networks [J]. Wireless Personal Communications, 2015, 80(3): 1049-1062. doi: 10.1007/s11277-014-2070-y.10.
|
[15] |
HAFIZUL ISLAM S K and LI Fagen. Leakage-free and provably secure certificateless signcryption scheme using bilinear pairings[J]. The Computer Journal, 2015, 58(10): 2636-2648. doi: 10.1093/comjnl/bxv002.
|
[16] |
SUN Yinxia and LI Hui. Eifficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Secience China Information Sciences, 2010, 53(3): 557-566. doi: 10.1007/s11432-010-0061-5.
|
[17] |
HUANG Q, WONG D S, and YANG G. Heterogeneous signcryption with key privacy[J]. Computer Journal, 2011, 54(4): 525-536. doi: 10.1093/comjnl/bxq095.
|
[18] |
LI Fagen, ZHANG Hui, and TAKAGI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420-429. doi: 1109/JSYST.2012. 2221897.
|
[19] |
俞惠芳, 杨波. 可证安全的无证书混合签密[J]. 计算机学报, 2015, 38(4): 805-813. doi: 10.3724/SP.J.1016.2015.00804.
|
|
YU Huifang and YANG Bo. Provably secure certificateless hybrid signcryption[J]. Chinese Journal of Computers, 2015, 38(4): 805-813. doi: 10.3724/SP.J.1016.2015.00804.
|
|
|
|