Efficient Constructions of Signcryption Schemes and Signcryption Composability

被引:0
|
作者
Matsuda, Takahiro [1 ]
Matsuura, Kanta [1 ]
Schuldt, Jacob C. N. [1 ]
机构
[1] Univ Tokyo, Tokyo 1138654, Japan
来源
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS | 2009年 / 5922卷
关键词
signcryption; multi-user security; generic construction; PUBLIC-KEY ENCRYPTION; HYBRID ENCRYPTION; SHORT SIGNATURES; SECURE; KEM/DEM;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we investigate simple but efficient constructions of signcryption schemes. Firstly, we show how symmetric primitives can be used to efficiently achieve outsider multi-user security, leading to a signcryption scheme with the currently lowest ciphertext and computational overhead. For the mixed security notions outsider confidentiality/insider unforgeability and insider confidentiality/outsider unforgeability, this approach yields lower ciphertext overhead and a higher level of security, respectively, compared to the current schemes. Secondly, we show a simple optimization to the well known "sign-then-encrypt" and "encrypt-then-sign" approaches to the construction of signcryption schemes by using tag-based encryption. Instantiations with our proposed tag-based schemes yield multi-user insider secure signcryption schemes in the random oracle model which is at least as efficient as any other existing scheme both in terms of ciphertext overhead and computational cost. Furthermore, we show that very efficient standard model signcryption schemes can be constructed using this technique as well. Lastly, we show how signatures and encryption can be combined in a non-black-box manner to achieve higher efficiency than schemes based on the above approach. We refer to signature and encryption schemes which can be combined in this way as signcryption composable, and we show that a number of the most efficient standard model encryption and signature schemes satisfy this, leading to the most efficient standard model signcryption schemes. Since all of our constructions are fairly simple and efficient, they provide a benchmark which can be used to evaluate future signcryption schemes.
引用
收藏
页码:321 / 342
页数:22
相关论文
共 50 条
  • [1] Efficient distributed signcryption scheme as group signcryption
    Kwak, DJ
    Moon, SJ
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 403 - 417
  • [2] Efficient identity-based broadcast signcryption schemes
    Kim, Intae
    Hwang, Seong Oun
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) : 914 - 925
  • [3] How to construct efficient signcryption schemes on elliptic curves
    Zheng, YL
    Imai, H
    INFORMATION PROCESSING LETTERS, 1998, 68 (05) : 227 - 233
  • [4] Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting
    Chiba, Daiki
    Matsuda, Takahiro
    Schuldt, Jacob C. N.
    Matsuura, Kanta
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2011), 2011, 6715 : 220 - 237
  • [5] Cryptanalysis and improvement of signcryption schemes
    Petersen, H
    Michels, M
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1998, 145 (02): : 149 - 151
  • [6] Efficient Certificateless Signcryption Scheme
    Yu, Gang
    Yang, Hongzhi
    Fan, Shuqin
    YongShen
    Han, Wenbao
    THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 55 - 59
  • [7] Efficient signcryption in the standard model
    Li, Fagen
    Zhang, Mingwu
    Takagi, Tsuyoshi
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (17) : 1977 - 1989
  • [8] A new efficient signcryption scheme in the standard model
    Yang, Zheng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (05) : 778 - 789
  • [9] Certificateless KEM and Hybrid Signcryption Schemes Revisited
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 294 - 307
  • [10] Signcryption schemes with threshold unsigncryption, and applications
    Javier Herranz
    Alexandre Ruiz
    Germán Sáez
    Designs, Codes and Cryptography, 2014, 70 : 323 - 345