Heterogeneous hybrid signcryption for multi-message and multi-receiver

被引:20
作者
Niu, Shufen [1 ]
Niu, Ling [1 ]
Yang, Xiyan [1 ]
Wang, Caifen [1 ]
Jia, Xiangdong [1 ]
机构
[1] Northwest Normal Univ, Coll Comp Sci & Engn, Lanzhou, Gansu, Peoples R China
基金
中国国家自然科学基金;
关键词
ID-BASED SIGNCRYPTION; SENSOR NETWORKS; EFFICIENT SIGNCRYPTION; PRIVACY; SECURITY; SCHEMES; SYSTEMS;
D O I
10.1371/journal.pone.0184407
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
To achieve secure communication in heterogeneous cryptography systems, we present a heterogeneous hybrid signcryption scheme. The proposed scheme allows a sender in an identity-based cryptography system to send multi-message to multi-receiver in a certificate-less cryptography system with different master keys. At the same time, all users are mapped to a distinct pseudo-identity for conditional identity privacy preservation. A trusted authority could trace the real identity when necessary. Compared with existing schemes, the proposed scheme is more practical for actual applications. In addition, the proposed scheme has indistinguishability against adaptive chosen ciphertext attacks and existential unforge-ability against adaptive chosen message attacks under the random oracle model.
引用
收藏
页数:13
相关论文
共 25 条
[1]   Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack [J].
Cramer, R ;
Shoup, V .
SIAM JOURNAL ON COMPUTING, 2003, 33 (01) :167-226
[2]   Hybrid signcryption schemes with outsider security (Extended abstract) [J].
Dent, AW .
INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 :203-217
[3]  
Dent AW, 2005, LECT NOTES COMPUT SC, V3574, P253
[4]   An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks [J].
Horng, Shi-Jinn ;
Tzeng, Shiang-Feng ;
Huang, Po-Hsian ;
Wang, Xian ;
Li, Tianrui ;
Khan, Muhammad Khurram .
INFORMATION SCIENCES, 2015, 317 :48-66
[5]   Heterogeneous Signcryption with Key Privacy [J].
Huang, Qiong ;
Wong, Duncan S. ;
Yang, Guomin .
COMPUTER JOURNAL, 2011, 54 (04) :525-536
[6]   Practical access control for sensor networks in the context of the Internet of Things [J].
Li, Fagen ;
Han, Yanan ;
Jin, Chunhua .
COMPUTER COMMUNICATIONS, 2016, 89-90 :154-164
[7]   Practical Signcryption for Secure Communication of Wireless Sensor Networks [J].
Li, Fagen ;
Han, Yanan ;
Jin, Chunhua .
WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (04) :1391-1412
[8]   Efficient Signcryption for Heterogeneous Systems [J].
Li, Fagen ;
Zhang, Hui ;
Takagi, Tsuyoshi .
IEEE SYSTEMS JOURNAL, 2013, 7 (03) :420-429
[9]   Identity-Based Hybrid Signcryption [J].
Li, Fagen ;
Shirase, Masaaki ;
Takagi, Tsuyoshi .
2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, :534-+
[10]  
Li FG, 2009, LECT NOTES COMPUT SC, V5487, P289, DOI 10.1007/978-3-642-01440-6_23