A lattice-based efficient heterogeneous signcryption scheme for secure network communications

被引:0
作者
Yu, Siqi [1 ]
Shang, Mengxue [1 ]
Li, Fengyin [1 ]
机构
[1] Qufu Normal Univ, Sch Comp Sci, Rizhao, Peoples R China
关键词
Lattice; heterogeneous signcryption; network communications; certificateless cryptography; identity-based cryptography;
D O I
10.3233/JHS-222020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ensuring the security of transmitted content is an important task in network communication. Signcryption technology combines signature and encryption operations in a single step to achieve message authentication and confidentiality. In practical applications, users are usually in different cryptographic systems, the ordinary signcryption technology cannot realize communication between two different cryptographic systems. And the ciphertext structure of the existing signcryption schemes is relatively complex, signcryption is not efficient. Therefore, in order to solve the problem of efficient communication between different cryptosystems and ensure quantum security, this paper proposes a lattice-based efficient heterogeneous signcryption scheme for secure network communications. This signcryption scheme accomplishes signcryption through matrix operations and hash functions, which avoids complex signcryption structures, efficiently realizes bidirectional message communication between identity-based cryptosystems and certificateless cryptosystems.
引用
收藏
页码:19 / 27
页数:9
相关论文
共 15 条
[1]  
Adat V, 2018, IEEE GLOB COMM CONF
[2]  
Gentry C, 2008, ACM S THEORY COMPUT, P197
[3]  
Koripi M., 2021, Wutan Huatan Jisuan Jishu, V17
[4]   A Lightweight Signcryption Method for Perception Layer in Internet-of-Things [J].
Kumar, Ashish ;
Saha, Rahul ;
Alazab, Mamoun ;
Kumar, Gulshan .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55 (55)
[5]   A lattice-based signcryption scheme without random oracles [J].
Lu, Xiuhua ;
Wen, Qiaoyan ;
Jin, Zhengping ;
Wang, Licheng ;
Yang, Chunli .
FRONTIERS OF COMPUTER SCIENCE, 2014, 8 (04) :667-675
[6]  
Lyubashevsky V, 2012, LECT NOTES COMPUT SC, V7237, P738, DOI 10.1007/978-3-642-29011-4_43
[7]   BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs [J].
Maria, Azees ;
Pandi, Vijayakumar ;
Lazarus, Jeatha Deborah ;
Karuppiah, Marimuthu ;
Christo, Mary Subaja .
SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
[8]   Worst-case to average-case reductions based on Gaussian measures [J].
Micciancio, Daniele ;
Regev, Oded .
SIAM JOURNAL ON COMPUTING, 2007, 37 (01) :267-302
[9]   A Decade of Lattice Cryptography [J].
Peikert, Chris .
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2014, 10 (04) :283-424
[10]   On Lattices, Learning with Errors, Random Linear Codes, and Cryptography [J].
Regev, Oded .
JOURNAL OF THE ACM, 2009, 56 (06)