Certificateless signcryption KEM to multiple recipients

被引:1
作者
Sun Y.-X. [1 ]
Li H. [1 ]
Li X.-Q. [1 ]
机构
[1] Key Lab. of Computer Networks and Information Security of Ministry of Education, Xidian University
来源
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology | 2010年 / 32卷 / 09期
关键词
Bilinear pairing; Certificateless; Cryptography; Multiple recipients; Provably secure; Random oracle model; Signcryption key encapsulation mechanism;
D O I
10.3724/SP.J.1146.2009.01260
中图分类号
学科分类号
摘要
Certificateless signcryption key encapsulation mechanism (CLSC-KEM), combined with a data encapsulation mechanism, is used to construct certificateless hybrid signcryption . This paper introduces a new concept: certificateless signcryption KEM to multiple recipients (mCLSC-KEM). The definition and the security models are given for this new primitive, and a concrete mCLSC-KEM scheme is presented. This scheme is much more efficient than the generic construction, for it needs to compute only one pairing during key encapsulation and one symmetric encryption during data encapsulation, in contrast to n pairings and n symmetric encryptions for the generic scheme. Our scheme is provably secure in the random oracle model, under the hardness assumption of the Gap-BDH problem.
引用
收藏
页码:2249 / 2252
页数:3
相关论文
共 18 条
[1]  
Al-Riyami S.S., Paterson K.G., Certificateless public key cryptography, ASIACRYPT, 2894, pp. 452-473, (2003)
[2]  
Shamir A., Identity-based cryptosystems and signature schemes, CRYPTO, 196, pp. 47-53, (1984)
[3]  
Boneh D., Franklin M., Identity-based encryption from the Weil pairing, CRYPTO, 2139, pp. 213-229, (2001)
[4]  
Zheng Y., Digital signcryption or how to achieve cost (Signature & encryption) << cost(Signature) + cost (Encryption), CRYPTO, 1294, pp. 165-179, (1997)
[5]  
An J.H., Dodis Y., Rabin T., On the security of joint signature and encryption, EUROCRYPT, 2332, pp. 83-107, (2002)
[6]  
Boyen X., Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography, Cryptology-CRYPTO, 2729, pp. 383-399, (2003)
[7]  
Barreto P.S.L.M., Libert B., McCullagh N., Quisquater J.J., Efficient and provably-secure identity-based signatures and signcryption from bilinear maps, Asiacrypt, 3788, pp. 515-532, (2005)
[8]  
Li F.-G., Hu Y.-P., Li G., An efficient identity-based signcryption scheme, Chinese Journal of Computers, 29, 9, pp. 1641-1647, (2006)
[9]  
Barbosa M., Farshim P., Certificateless signcryption, ACM Symposium on Information, Computer and Communications Security-ASIACCS, pp. 369-372, (2008)
[10]  
Wu C.-H., Chen Z.-X., A new efficient certificateless signcryption scheme, International Symposium on Information Science and Engineering, pp. 661-664, (2008)