Provably secure certificateless hybrid signcryption

被引:0
作者
Yu, Hui-Fang [1 ,2 ]
Yang, Bo [1 ]
机构
[1] School of Computer Science, Shaanxi Normal University, Xi'an
[2] School of Computer, Qinghai Normal University, Xining
来源
Jisuanji Xuebao/Chinese Journal of Computers | 2015年 / 38卷 / 04期
基金
中国国家自然科学基金;
关键词
Bilinear pairing; Certificateless cryptography; Cryptography; Hybrid signcryption; Provable security;
D O I
10.3724/SP.J.1016.2015.00804
中图分类号
学科分类号
摘要
Hybrid signcryption can process the messages of arbitrary length, while public key signcryption cannot. In this paper, we extend hybrid signcryption technique to the certificateless setting, and construct a provably secure certificateless hybrid signcryption (PS-CLHS) scheme. In the random oracle model, we prove that the proposed scheme satisfies the indistinguishability against adaptive chosen-ciphertext attacks and unforgeability against adaptive chosen-message attacks under the hardness of the bilinear Diffie-Hellman problem and computational Diffie-Hellman problem. In addition, this scheme has lower computational complexity and is appropriate to applications in practice. ©, 2015, Science Press. All right reserved.
引用
收藏
页码:804 / 813
页数:9
相关论文
共 17 条
  • [1] Shamir A., Identity-based cryptosystem and signature scheme, Proceedings of the CRYPT 1984, pp. 47-53, (1984)
  • [2] Al-Riyami S., Paterson K.G., Certificateless public key cryptography, Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, pp. 452-474, (2003)
  • [3] Yu G., Han W.-B., Certificateless signcryption scheme with proxy unsigncryption, Chinese Journal of Computers, 34, 7, pp. 1291-1299, (2011)
  • [4] Liu Z., Hu Y., Zhang X., Et al., Certificateless signcryption scheme in the standard model, Information Sciences, 180, 3, pp. 452-464, (2010)
  • [5] Li H.-X., Chen X.-B., Pang L.-J., Wang Y.-M., Certificateless multi-receiver signcryption scheme based on multivariate public key cryptography, Chinese Journal of Computers, 35, 9, pp. 1881-1889, (2012)
  • [6] Cramer R., Shoup V., Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack, SIAM Journal on Computing, 33, 1, pp. 167-226, (2003)
  • [7] Abe M., Gennaro R., Kurosawa K., Tag-KEM/DEM: A new framework for hybrid encryption, Journal of Cryptology, 21, 1, pp. 97-130, (2008)
  • [8] Kurosawa K., Desmedt Y., A new paradigm of hybrid encryption scheme, Proceedings of the 24th Annual International Cryptology Conference, pp. 426-442, (2004)
  • [9] Bentahar K., Farshim P., Malone-Lee J., Smart N.P., Generic constructions of identity-based and certificateless KEMs, Journal of Cryptology, 21, 2, pp. 178-199, (2008)
  • [10] Huang Q., Wong D., Generic certificateless encryption secure against malicious-but-passive KGC attacks in the standard model, Journal of Computer Science and Technology, 25, 4, pp. 807-826, (2010)