|
|
A Provable Aggregate Signcryption for Heterogeneous Systems |
NIU Shufen NIU Ling WANG Caifen DU Xiaoni |
(College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China) |
|
|
Abstract Heterogeneous signcryption can ensure the confidentiality, authentication and unforgeability of information transmission of cross cryptograph environment. Through analyzing some existing heterogeneous signcryption schemes, it is found that they can only be applicable to single message of signcryption. In order to improve the efficiency of computation and transmission in heterogeneous systems, a provable multi-message aggregate signcryption is proposed. In the new scheme, the pairing numbers are constant in verification phase, it not depends on the number of signcryption message. Moreover, based on the assumption of q-bilinear Diffie- Hellman inversion issue and Discrete logarithm, in the random oracle model, it is proved that the new scheme satisfies the properties of confidentiality and unforgeability. Furthermore, theoretical analysis and experimental results demonstrate that the computation overhead efficiency of the proposed scheme is better than the existing one.
|
Received: 15 August 2016
Published: 21 March 2017
|
|
Fund: The National Natural Science Foundation of China (61562077, 61462077, 61662071), The Young Teacher’s Scientific Research Ability Promotion Program of Northwest Normal University (NWNU-LKQN-13-12) |
Corresponding Authors:
NIU Shufen
E-mail: sfniu76@nwnu.edu.cn
|
|
|
|
[1] |
ZHENG Yuliang. Digital signcryption or how to achieve cost(signature & encryption)<<cost(signature) +cost (encryption)[C]. Proceedings of the Cryptology-CRYPTO, 1997, California, USA, 1997: 165-179. doi: 10.1007/ BFb0052234.
|
[2] |
BAEK J, STEINFELD R, and ZHENG Yuliang. Formal proofs for the security of signcryption[C]. Proceedings of the Cryptology-PKC2002, Paris, France, 2002: 81-98. doi: 10. 1007/3-540-45664-3_6.
|
[3] |
PANG Liaojun, GAO Lu, LI Huixian, et al. Anonymous multi-receiver ID-based signcryption scheme[J]. Iet Information Security, 2015, 9(3): 194-201. doi: 10.1049/ iet-ifs.2014.0360.
|
[4] |
LI Fagen, ZHANG Hui, and TSUYOSHI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420-429. doi: 10.1109/JSYST.2012. 2221897.
|
[5] |
张雪, 冀会芳, 李光松, 等. 基于身份的跨信任域签密方案[J]. 计算机科学, 2015, 42(5): 165-168. doi: 10.11896/j.issn.1002- 137X.2015.5.033.
|
|
ZHANG Xue, JI Huifang, LI Guangsong, et al. Identity-based signcryption cross autonomous domains[J]. Computer Science, 2015, 42(5): 165-168. doi: 10.11896/j.issn.1002-137X. 2015.5.033.
|
[6] |
ZHOU Yanwei, YANG Bo, and ZHANG Wenzheng. Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing[J]. Discrete Applied Mathematics, 2016, 204(C): 185-202. doi: 10.1016/ j.dam.2015.10.018.
|
[7] |
LI Fagen, HAN Yanan, and JIN Chunhua. Practical signcryption for secure communication of wireless sensor networks[J]. Wireless Personal Communications, 2016, 89(4): 1391-1412. doi: 10.1007/s11277-016-3327-4.
|
[8] |
SUN Yinxia and LI Hui. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Sciece China Information Sciences, 2010, 53(3): 557-566. doi: 10.1007/s11432-010-0061-5.
|
[9] |
HUANG Qiong, WONG D S, and YANG Guomin. Heterogeneous signcryption with key privacy[J]. Computer Journal, 2011, 54(4): 525-536. doi: 10.1093/comjnl/bxq095.
|
[10] |
张玉磊, 王欢, 李臣意, 等. 可证安全的紧致无证书聚合签密方案[J]. 电子与信息学报, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
|
|
ZHANG Yulei, WANG Huan, LI Chenyi, et al. Provable secure and compact certificateless aggregate signcryption scheme[J]. Journal of Electronics & Information Technology, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
|
[11] |
WANG Hao, LIU Zhen, LIU Zhe, et al. Identity-based aggregate signcryption in the standard model from multilinear maps[J]. Frontiers of Computer Science, 2016, 10(4): 741-754. doi: 10.1007/s11704-015-5138-2.
|
[12] |
HAN Yiliang and CHEN Fei. The multilinear maps based certificateless aggregate signcryption scheme[C]. IEEE International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Xi’an, China, 2015: 92-99. doi: 10.1109/CyberC.2015.93.
|
[13] |
ESLAMI Z and PAKNIAT N. Certificateless aggregate signcryption[J]. Journal of King Saud University-Computer and Information Sciences, 2014, 26(3): 276-286. doi: 10. 1016/j.jksuci.2014.03.006.
|
[14] |
CHEN Juqin and REN Xiaoxi. A privacy protection scheme based on certificateless aggregate signcryption and masking random number in smart grid[C]. International Conference on Mechanical Materials and Manufacturing Engineering, Wuhan, China, 2016: 10-13. doi: 10.2991/mmme-16.2016.3.
|
[15] |
DAVID P and JACQUES S. Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000, 13(3): 361-396. doi: 10.1007=s001450010003.
|
[16] |
The pairing-based cryptography library[OL]. http://crypto. stanford.edu/pbc/, 2015.
|
|
|
|