期刊文献+

Constructing parallel long-message signcryption scheme from trapdoor permutation 被引量:1

Constructing parallel long-message signcryption scheme from trapdoor permutation
原文传递
导出
摘要 A highly practical parallel signcrypUon scheme named PLSC from trapdoor permutations (TDPs for short) was built to perform long messages directly. The new scheme follows the Idea "scramble all, and encrypt small", using some scrambling operation on message m along with the user's Identities, and then passing, In paraliel, small parts of the scrambling result through corresponding TOPs. This design enables the scheme to flexibly perform long messages of arbitrary length while avoid repeatedly invoking TDP operations such as the CBC mode, or verbosely black-box composing symmetric encryption and slgncryption, resulting in noticeable practical sevlngs in both message bandwidth and efficiency. Concretely, the signcryptlon scheme requires exactly one computation of the "receiver's TDP" (for "encryptlon") and one Inverse computation of the "sender's TDP" (for "authentication"), which Is of great practical significance in directly performing long messages, since the major bottleneck for many public encryptlon schemes is the excessive computational overhead of performing TDP operations. Cutting out the verbosely repeated padding, the newly proposed scheme Is more efficient than a black-box hybrid scheme. Most importantly, the proposed scheme has been proven to be tightly semanUcaiiy secure under adaptive chosen clphertext attacks (iND-CCA2) and to provide integrity of clphertext (INT-CTXT) as well as non-repudiation in the random oracle model. All of these security guarantees are provided in the full multi-user, insider-security setting. Moreover, though the scheme is designed to perform long messages, it may also be appropriate for settings where It is Impractical to perform large block of messages (i.e. extremely low memory environments such as smart cards). A highly practical parallel signcrypUon scheme named PLSC from trapdoor permutations (TDPs for short) was built to perform long messages directly. The new scheme follows the Idea "scramble all, and encrypt small", using some scrambling operation on message m along with the user's Identities, and then passing, In paraliel, small parts of the scrambling result through corresponding TOPs. This design enables the scheme to flexibly perform long messages of arbitrary length while avoid repeatedly invoking TDP operations such as the CBC mode, or verbosely black-box composing symmetric encryption and slgncryption, resulting in noticeable practical sevlngs in both message bandwidth and efficiency. Concretely, the signcryptlon scheme requires exactly one computation of the "receiver's TDP" (for "encryptlon") and one Inverse computation of the "sender's TDP" (for "authentication"), which Is of great practical significance in directly performing long messages, since the major bottleneck for many public encryptlon schemes is the excessive computational overhead of performing TDP operations. Cutting out the verbosely repeated padding, the newly proposed scheme Is more efficient than a black-box hybrid scheme. Most importantly, the proposed scheme has been proven to be tightly semanUcaiiy secure under adaptive chosen clphertext attacks (iND-CCA2) and to provide integrity of clphertext (INT-CTXT) as well as non-repudiation in the random oracle model. All of these security guarantees are provided in the full multi-user, insider-security setting. Moreover, though the scheme is designed to perform long messages, it may also be appropriate for settings where It is Impractical to perform large block of messages (i.e. extremely low memory environments such as smart cards).
出处 《Science in China(Series F)》 2007年第1期82-98,共17页 中国科学(F辑英文版)
基金 Supported by the National Basic Research Program (Grant No. 2004CB318004) the National Natural Science Foundation of China (Grant Nos. 60373047 and 90604036)
关键词 authenticated encryption SIGNCRYPTION trapdoor permutations PARALLEL authenticated encryption, signcryption, trapdoor permutations, parallel
  • 相关文献

参考文献19

  • 1[1]An J H,Dodis Y,Rabin T.On the security of joint signature and encryption.In:Knudsen L,ed.Advances in Cryptology-EUROCRYPT'02,LNCS Vol.2332.Berlin:Springer-Verlag,2002.83-107.Available from http://eprint.iacr.org/ 2002/046/
  • 2[2]Zheng Y.Digital signcryption or how to achieve cost (signature & encryption) cost (signature) + cost (encryption).In:Kaliski B S,ed.Advances in Cryptology-CRYPTO'97,LNCS Vol.1294.Berlin:Springer-Verlag,1997.165-179
  • 3[3]Zheng Y,Imai H.Efficient signcryption schemes on elliptic curves.Inf Proc Lett,1998,68(6):227-233
  • 4[4]Petersen H,Michels M.Cryptanalysis and improvement of signcryption schemes.IEEE Comput Dig Commun,1998,145(2):140-151
  • 5[5]He W,Wu T.Cryptanalysis and improvement of petersen-michels signcryption schemes.IEEE Comput Dig Commun,1999,146(2):123-124
  • 6[6]Baek J,Steinfeld R,Zheng Y.Formal proofs for the security of signcryption.In:Naccache D,Pailler P,eds.5th International Workshop on Practice and Theory in Public Key Cryptosystems PKC 2002,LNCS Vol.2274.Berlin:Springer-Verlag,2002.80-98
  • 7[7]Bellare M,Rogaway P.Optimal asymmetric encryption.In:Santis A D,ed.Advances in Cryptology--EUROCRYPT 94,LNCS Vol.950.Berlin:Springer-Verlag,1995.92-111.Revised version available from http://www-cse.ucsd.edu/ users/mihir/
  • 8[8]Shoup V.OAEP reconsidered.In:Kilian J,ed.Advances in Cryptology--CRYPTO 2001,LNCS Vol.2139.Berlin:Springer-Verlag,2001.240-259
  • 9[9]Bellare M,Rogaway P.The exact security of digital signatures:How to sign with RSA and Rabin.In:Maurer U,ed.Advances in Cryptology--EUROCRYPT 96,LNCS Vol.1070.Berlin:Springer-Verlag,1996.399-416.Revised version appears in http://www-cse.ucsd.edu/users/mihir/papers/crypto-papers.html
  • 10[10]Fujisaki E,Okamoto T.Secure integration of asymmetric and symmetric encryption schemes.In:Wiener M,ed.Advances in Cryptology--Proceedings of CRYPTO'99,LNCS Vol.1666.Berlin:Springer-Verlag,1999.537-554

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部