Certificateless hybrid signcryption

被引:33
作者
Li, Fagen [1 ,2 ]
Shirase, Masaaki [3 ]
Takagi, Tsuyoshi [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[2] Kyushu Univ, Inst Math Ind, Fukuoka 8190395, Japan
[3] Future Univ Hakodate, Sch Syst Informat Sci, Hakodate, Hokkaido 0418655, Japan
基金
中国国家自然科学基金;
关键词
Cryptography; Signcryption; Hybrid signcryption; DEM; Signcryption tag-KEM; KEY-ENCAPSULATION; ENCRYPTION SCHEMES; SECURITY; EFFICIENT;
D O I
10.1016/j.mcm.2012.06.011
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. In this paper, we address a question of whether it is possible to construct a hybrid signcryption scheme in the certificateless setting. This question seems to have never been addressed in the literature. We answer the question positively in this paper. In particular, we extend the concept of signcryption tag-KEM to the certificateless setting. We show how to construct a certificateless signcryption scheme using certificateless signcryption tag-KEM. We also give an example of certificateless signcryption tag-KEM. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:324 / 343
页数:20
相关论文
共 43 条
  • [1] Tag-KEM/DEM: A new framework for hybrid encryption
    Abe, Masayuki
    Gennaro, Rosario
    Kurosawa, Kaoru
    [J]. JOURNAL OF CRYPTOLOGY, 2008, 21 (01) : 97 - 130
  • [2] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [3] An JH, 2002, LECT NOTES COMPUT SC, V2332, P83
  • [4] [Anonymous], 2003054 CRYPT EPRINT
  • [5] [Anonymous], INFORM SECURITY APPL
  • [6] [Anonymous], 2002098 CRYPT EPRINT
  • [7] Formal proofs for the security of signcryption
    Baek, Joonsang
    Steinfeld, Ron
    Zheng, Yuliang
    [J]. JOURNAL OF CRYPTOLOGY, 2007, 20 (02) : 203 - 235
  • [8] Bao F., 1998, Public Key Cryptography. First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98. Proceedings, P55, DOI 10.1007/BFb0054014
  • [9] Barbosa M., 2008, P 2008 ACM S INF COM, P369
  • [10] Barreto PSLM, 2005, LECT NOTES COMPUT SC, V3788, P515