Low-computation certificateless hybrid signcryption scheme

Hui-fang YU, Bo YANG

PDF(541 KB)
PDF(541 KB)
Front. Inform. Technol. Electron. Eng ›› 2017, Vol. 18 ›› Issue (7) : 928-940. DOI: 10.1631/FITEE.1601054
Article
Article

Low-computation certificateless hybrid signcryption scheme

Author information +
History +

Abstract

Hybrid signcryption is an important technique signcrypting bulk data using symmetric encryption. In this paper, we apply the technique of certificateless hybrid signcryption to an elliptic-curve cryptosystem, and construct a low-computation certificateless hybrid signcryption scheme. In the random oracle model, this scheme is proven to have indistinguishability against adaptive chosen-ciphertext attacks (IND-CCA2) under the elliptic-curve computation Diffie-Hellman assumption. Also, it has a strong existential unforgeability against adaptive chosen-message attacks (sUF-CMA) under the elliptic-curve discrete logarithm assumption. Analysis shows that the cryptographic algorithm does not rely on pairing operations and is much more efficient than other algorithms. In addition, it suits well to applications in environments where resources are constrained, such as wireless sensor networks and ad hoc networks.

Keywords

Hybrid signcryption / Scalar multiplication / Certificateless cryptosystem / Provable security

Cite this article

Download citation ▾
Hui-fang YU, Bo YANG. Low-computation certificateless hybrid signcryption scheme. Front. Inform. Technol. Electron. Eng, 2017, 18(7): 928‒940 https://doi.org/10.1631/FITEE.1601054

References

[1]
Dent,A.W., 2005. Hybrid signcryption schemes with insider security. LNCS, 3574:253–266. http://dx.doi.org/10.1007/11506157_22
[2]
Hwang,R.J., Lai,C.H., Su,F.F., 2005. An efficient signcryp-tion scheme with forward secrecy based on elliptic curve. Appl. Math. Comput., 167:870–881. http://dx.doi.org/10.1016/j.amc.2004.06.124
[3]
Koblitz,N., 1987. Elliptic curve cryptosystems. Math. Com-put., 48(177):203–209. http://dx.doi.org/10.1090/S0025-5718-1987-0866109-5
[4]
Li,F.G., Liao,Y.J., Qin,Z.G., , 2012. Further improve-ment of an identity-based signcryption scheme in the standard model. Comput. Electr. Eng., 38(2):413–421. http://dx.doi.org/10.1016/j.compe-leceng.2011.11.001
[5]
Li,F.G., Shirase, M., Takagi,T. , 2013. Certificateless hybrid signcryption. Math. Comput. Model., 57(3-4):324–343. http://dx.doi.org/10.1016/j.mcm.2012.06.011
[6]
Li,F.G., Zheng,Z.H., Jin,C.H., 2016. Identity-based deniable authenticated encryption and its application to e-mail system. Telecommun. Syst., 62(4):625–639. http://dx.doi.org/10.1007/s11235-015-0099-1
[7]
Pang,L.J., Cui,J.J., Li,H.X., , 2011. A new multi- receiver ID-based anonymous signcryption. Chin. J. Comput., 34(11):2104–2113. http://dx.doi.org/10.3724/SP.J.1016.2011.02104
[8]
Sun,Y.X., Li,H., 2011. Efficient certificateless hybrid sign-cryption. J. Softw., 22(7):1690–1698. http://dx.doi.org/10.3724/SP.J.1001.2011.03825
[9]
Szczechowiak,P., Oliveira, L.B., Scott,M. , , 2008. Testing the limits of elliptic curve cryptography in sensor networks. LNCS, 4913:305–320. http://dx.doi.org/10.1007/978-3-540-77690-1_19
[10]
Tan,C.H., 2008. Insider-secure signcryption KEM/tag-KEM schemes without random oracles. 3rd Int. Conf. on Availability, Reliability and Security, p.1275–1281. http://dx.doi.org/10.1109/ARES.2008.112
[11]
Wang,D.X., Teng,J.K., 2015. Provably secure identity-based aggregate signcryption scheme. J. Comput. Appl., 35(2): 412–415. http://dx.doi.org/10.11772/j.issn.1001-9081.2015.02.0412
[12]
Wang,F.H., Hu,Y.P., Wang,C.X., 2012. Post-quantum secure hybrid signcryption from lattice assumption. Appl. Math. Inform. Sci., 6(1):23–28.
[13]
Youn,T.Y., Hong,D., 2012. Signcryption with fast online signing and short signcryptext for secure and private communication. Sci. China Inform. Sci., 55(11):2530–2541. http://dx.doi.org/10.1007/s11432-012-4635-2
[14]
Yu,H.F., Yang,B., 2015a. Identity-based hybrid signcryption scheme using ECC. J. Softw., 26(12):3174–3182. http://dx.doi.org/10.13328/j.cnki.jos.004819
[15]
Yu,H.F., Yang,B., 2015b. Provable secure certificateless hybrid signcryption. Chin. J. Comput.,38(4):804–813. http://dx.doi.org/10.3724/SP.J.1016.2015.00804
[16]
Zhang,B., Xu,Q.L., 2010. Identity-based multi-signcryption scheme without random oracles. Chin. J. Comput., 33(1):103–110.http://dx.doi.org/10.3724/SP.J.1016.2010.00103

RIGHTS & PERMISSIONS

2017 Zhejiang University and Springer-Verlag Berlin Heidelberg
PDF(541 KB)

Accesses

Citations

Detail

Sections
Recommended

/