期刊文献+

New Multivariate-Based Certificateless Hybrid Signcryption Scheme for Multi-Recipient 被引量:2

New Multivariate-Based Certificateless Hybrid Signcryption Scheme for Multi-Recipient
原文传递
导出
摘要 With the development of quantum computer, multivariate public key cryptography withstanding quantum attack has became one of the research focus. The existed signcryption schemes from discrete logarithm and bilinear paring are facing the serious threats. Based on multivariate public key cryptography, a new certificateless multi-receiver hybrid signcryption scheme has been proposed. The proposal reduced the cipher text and could handle arbitrary length messages by employing randomness reusing and hybrid encryption, as well as keeping security. In the random oracle model, the scheme's confidentiality could withstand the IND-CCA2 adversary and its unforgeability could withstand the UF-CMA adversary under the hardness of multivariat quadratic (MQ) problem and isomorphism of polynomials (IP) assumption. It has less computation overhead and higher transmission efficiency than others. It reduced 33% cipher data compared with the existed similar scheme. With the development of quantum computer, multivariate public key cryptography withstanding quantum attack has became one of the research focus. The existed signcryption schemes from discrete logarithm and bilinear paring are facing the serious threats. Based on multivariate public key cryptography, a new certificateless multi-receiver hybrid signcryption scheme has been proposed. The proposal reduced the cipher text and could handle arbitrary length messages by employing randomness reusing and hybrid encryption, as well as keeping security. In the random oracle model, the scheme's confidentiality could withstand the IND-CCA2 adversary and its unforgeability could withstand the UF-CMA adversary under the hardness of multivariat quadratic (MQ) problem and isomorphism of polynomials (IP) assumption. It has less computation overhead and higher transmission efficiency than others. It reduced 33% cipher data compared with the existed similar scheme.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期433-440,共8页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation of China(61103231,61103230,61272492,61202492) the Project Funded by China Postdoctoral Science Foundation and Natural Science Basic Research Plan in Shaanxi Province of China(2014JQ8358,2014JQ8307,2014JM8300)
关键词 multivariate public key cryptography certificateless hybrid signcryption multi-receiver post-quantum cryptography multivariate public key cryptography certificateless hybrid signcryption multi-receiver post-quantum cryptography
  • 相关文献

参考文献15

  • 1MatsumotT, Imai H. Public quadratic polynomial-tuples for efficient signature-verification and message-encryption [C]// EUROCRYPT1988, LNCS 330. Heidelberg: Springer-Verlag, 1988:419-453.
  • 2Tsujii S,Kurosawa K, Itoh T, et al. A public-key cryptosystem based on a quantum computer [J], SIAM J Computing, 1997, 26:1484-1509.
  • 3Patarin J. Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms[C] // Advances in Cryptology—Eurocrypf 96.Berlin, Heidelberg: Springer-Verlag, 1996: 33-48.
  • 4Akkar M L, Courtois N, Goubin L, et al. A fast and secure implementation of Sflash [C]// PA'C’2003, LNCS 2567, Heidelberg: Springer-Verlag, 2002: 267-278.
  • 5Kipins A, Patarin J, Goubin L. Unbalanced oil and vinegar signature scheme [C]//CRYPTO' 1999, LNCS 1666. Heidelberg: Springer-Verlag, 1999: 19-30.
  • 6Ding J, Schmidt D. Rainbow, a new multivariate polynomial sdignature schemc[C]///!C/VS’2005, LNCS 3531. Heidelberg: Springer-Verlag, 2005: 164-175.
  • 7Zheng Y L. Digital signcryption or how to achieve cost (signature&encryption) ?cost (signature) + cost (encryption) [C] // Cryptology']991, LNCS 1294. Heidelberg: Springer-Verlag, 1997: 165-179.
  • 8Malone-Lee J. Identity-Based Signcryption[EB/OL], [2002-07-19]. I A CR Cryptology ePrint Archive, Report 2002/098. http://eprint.iacr.orgl2002/098.
  • 9Barbosa M, Farshim P. Certificateless signcryption[C]//Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. New York: ACM Press, 2008: 369-372.
  • 10Dent A W. Hybrid signcryption schemes with outsider security [C]// Information Security, LNCS 3650. Heidelberg: Springer-Verlag, 2005: 203-217.

二级参考文献15

  • 1Shamir A. Identity based cryptosystem and signature scheme//Proeeedings of the CRYPTO 1984. California, USA, 1984:47-53.
  • 2A1-Riyami S S, Paterson K G. Certificateless public key cryptography//Laih C S. Cryptology-ASIACRYPT 2003. LNCS 2894. Berlin: Springer-Verlag, 2003:452-473.
  • 3Barbosa M, Farshim P. Certificateless signcryption//Pro- ceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS). New York, USA, 2008:369-372.
  • 4Zheng Y. Digital signcryption or how to achieve cost (signa- ture & encryption)<cost (signature)+cost (encryption)// Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptotogy. London, UK, 1997: 165-179.
  • 5Barreto P L, Deusajute A M, Cruz E C, et al. Toward effi- cient certificateless signcryption from (and without) bilinear pairings//Proceedings of the 2008 Brazilian Symposium on Information and Computer System Security (SBSeg 2008). Gramado, Brazil, 2008:115-125.
  • 6Li Fagen, Masaaki S, T suyoshi T. Certificateless hybrid signcryption//Feng Bao. Information Security Practice and Experience 2009. LNCS 5451. Berlin: Springer-Verlag, 2009:112-123.
  • 7Selvi S S D, Vivek S S, Shukla D, et al. Efficient and prov- ably secure certificateless multi receiver signcryption//Joon- sang Baek. Provable Security 2008. LNCE 5324. Berlin: Springer-Vertag, 2008: 52-67.
  • 8Miao Songqin, Zhang Futai, Zhang Lei. Cryptanalysis of a certificateless multi-receiver signcryption scheme//Proceedings of the International Conference on Multimedia Information Net- working and Security. Nanjing, China, 2010: 593-597.
  • 9Li Peng-Cheng, lie Ming-Xing, Li Xiao, et al. Efficient and provably secure certificateless signcryption from bilinear pair ings. Journal of Computational Information Systems, 2010, 6(11) : 3643-3650.
  • 10Jing Xiao-Fei. Provably secure certificateless signcryption scheme without pairing//Proceedings of the International Conference on Electronic and Mechanical Engineering and In formation Technology. Harbi:a, China, 2011:4753-4756.

共引文献12

同被引文献29

  • 1Cramer R,Shoup V.Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack[J].SIAM Journal on Computing,2004,33(1):167-226.
  • 2Abe M,Gennaro R,Kurosawa K.Tag-KEM/DEM:a new framework for hybrid encryption[J].Journal of Cryptology,2008(21):97-130.
  • 3Kurosawa K,Desmedt Y.A new paradigm of hybrid encryption scheme[C]//Proceedings of the 24th Annual International CryptologyConference.Santa Barbara,California,USA,2004:426-442.
  • 4Fujisaki E,Okamoto T.Secure integration of asymmetric and symmetric encryption schemes[C]//Proceedings of CRYPTO’99,Lecture Notes in Computer Science Volume 1666,1999:537-554.
  • 5赖欣.混合密码体制的理论研究与方案设计[D].西安:西安交通大学,2005.
  • 6Dent A.Hybrid signcryption schemes with insider security[C]//Proceedings ofthe 10th Australasian Conference on Information Security and Privacy,Lecture Notes in Computer ScienceVolume 3574,Brisbane,Australia,2005:253-266.
  • 7Dent A.Hybrid signcryption schemes with outsider security[C]//Proceedings ofthe 8th International Information Security Conference,Lecture Notes in Computer ScienceVolume3650,Singapore,2005:203-217.
  • 8Singh K.Identity-based hybrid signcryption revisited[C]//Proceedings of the 2012International Conference on Information Technology and e-Services,Washington,2012:34-39.
  • 9Li F G,Shirase M,Takagi T.Certificateless hybrid signcryption[J].Mathematical and Computer Modelling,2013,57(3/4):324-343.
  • 10Li X X,Qian H F,Yu Y,et al..Constructing practical signcryption KEM from standard assumptions without random oracles[C]//Proceedings of Applied Cryptography and Network Security,Lecture Notes in Computer ScienceVolume 7954,2013:186-201.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部