|
|
Efficient Heterogeneous Signcryption Scheme in the Standard Model |
WANG Caifen①② LI Yahong② ZHANG Yulei① NIU Shufen① |
①(College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China)
②(College of Mathematics and Statistics, Northwest Normal University, Lanzhou 730070, China) |
|
|
Abstract Heterogeneous signcryption scheme can ensure the confidentiality and the authentication?for data communication between different security domains. Some existing heterogeneous signcryption schemes are analyzed to be secure in the random oracle model. Based on this problem, an Identity-Based Cryptography (IBC) to Public Key Infrastructure (PKI) signcryption scheme is proposed. The proposed scheme has the confidentiality and the unforgeability under the Computational Diffie-Hellman (CDH) problem and the Decisional Bilinear Diffie-HellmanB (DBDH) problem. Through the theoretical and experimental analysis, both the computational costs and the communication overheads of the proposed scheme are more efficient.
|
Received: 24 June 2016
Published: 09 February 2017
|
|
Fund: The National Natural Science Foundation of China (61163038, 61562077, 61662069), Research Fund of Higher Education of Gansu Province (2014-A011), The Foundation for Excellent Young Teachers by Northwest Normal University (NWNU-LKQN-14-7) |
Corresponding Authors:
WANG Caifen
E-mail: wangcf@nwnu.edu.cn
|
|
|
|
[1] |
ZHENG Y. Digital signcryption or how to achieve cost (signature & encryption)<<cost(signature)+cost (encryption)[C]. Proceedings of the Cryptology- CRYPTO1997, California, USA, 1997: 165-179. doi: 10. 1007/BFb0052234.
|
[2] |
PAN Chunhua, LI Shunpeng, ZHU Qihui, et al. Notes on proxy signcryption and multi-proxy signature schemes[J]. International Journal of Network Security, 2015, 17(1): 29-33.
|
[3] |
项顺伯, 徐兵, 柯文德. 基于身份的在线/离线广播签密方案[J]. 四川大学学报(工程科学版), 2016, 48(2): 156-161. doi: 10.1007/BFb0052234.10.15961/j.jsuese.2016.02.023.
|
|
XIANG Shunbo, XU Bing, and KE Wende. Identity-based online /offline broadcast signcryption scheme[J]. Journal of Sichuan University (Engineer Science), 2016, 48(2): 156-161. doi: 10.1007/BFb0052234.10.15961/j.jsuese.2016.02.023.
|
[4] |
李慧贤, 巨龙飞. 对一个匿名多接收者签密方案的安全性分析与改进[J]. 电子学报, 2015, 43(11): 2187-2193. doi:10.3969 /j. issn.0372-2112.2015.11.008.
|
|
LI Huixian and JU Longfei. Security analysis and improvement of an anonymous multi-receiver signcryption scheme[J]. Acta Electronica Sinica, 2015, 43(11): 2187-2193. doi: 10.3969/j.issn.0372-2112.2015.11.008.
|
[5] |
张玉磊, 王欢, 李臣意, 等. 可证安全的紧致无证书聚合签密方案[J]. 电子与信息学报, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
|
|
ZHANG Yulei, WANG Huan, LI Chenyi, et al. Provable secure and compact certificateless aggregate signcryption Scheme[J]. Journal of Electronics & Information Technology, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
|
[6] |
刘雪峰, 张玉清, 王鹤, 等. 一种后向撤销隐私安全的车载自组织网络快速匿名消息认证协议[J]. 电子与信息学报, 2014, 36(1): 94-100. doi: 10.3724/SP.J.1146.2013.00342.
|
|
LIU Xuefeng, ZHANG Yuqing, WANG He, et al. An efficient anonymity message authentication with backward secure revocation for vehicular Ad hoc networks[J]. Journal of Electronics & Information Technology, 2014, 36(1): 94-100. doi: 10.3724/SP.J.1146.2013.00342.
|
[7] |
张宇, 陈晶, 杜瑞颖, 等. 适于车载网安全通信的高效签密方案[J]. 电子学报, 2015, 43(3): 512-517. doi: 10.3969/j.issn. 0372-2112.2015.03.015.
|
|
ZHANG Yu, CHEN Jing, DU Ruiying, et al. An efficient signcryption scheme for secure communication of VANET[J]. Acta Electronica Sinica, 2015, 43(3): 512-517. doi: 10.3969/j. issn.0372-2112.2015.03.015.
|
[8] |
TAN C. Signcryption scheme in multi-user setting without random oracles[C]. Proceedings of the 3rd International Workshop on Security, Kagawa, Japan, 2008: 64-82. doi: 10.1007/978-3-540-89598-5_5.
|
[9] |
LI Fageng and TAKAGI T. Secure identity-based signcryption in the standard model[J]. Mathematical & Computer Modelling, 2013, 57(11/12): 2685-2694. doi: 10.1016/j.mcm.2011.06.043.
|
[10] |
LI Xiangxue, QIAN Haifeng, WENG Jian, et al. Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model[J]. Mathematical & Computer Modelling, 2013, 57(3/4): 503-511. doi: 10.1016/j.mcm. 2012.06.030.
|
[11] |
LI Fageng, ZHANG Mingwu, and TSUYOSHI T. Efficient signcryption in the standard model[J]. Concurrency & Computation Practice & Experience, 2012, 24(17): 1977-1989. doi: 10.1002/cpe.1823.
|
[12] |
SUN Yinxia and LI Hui. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Sciece China Information Sciences, 2010, 53(3): 557-566. doi: 10.1007/s11432-010-0061-5.
|
[13] |
HUANG Qiong, DUN C, and YAN Guomin. Heterogeneous signcryption with key privacy[J]. Computer Journal, 2011, 54(4): 525-536. doi: 10.1093/comjnl/bxq095.
|
[14] |
LI Fageng, ZHANG Hui, and TAKAGI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420-429. doi: 10.1109/JSYST.2012. 2221897.
|
[15] |
SHOUP V. OAEP Reconsidered[J]. Journal of Cryptology, 2000, 15(4): 223-249. doi: 10.1007/3-540-44647-8_15.
|
|
|
|