Efficient Constructions of Signcryption Schemes and Signcryption Composability

被引:0
|
作者
Matsuda, Takahiro [1 ]
Matsuura, Kanta [1 ]
Schuldt, Jacob C. N. [1 ]
机构
[1] Univ Tokyo, Tokyo 1138654, Japan
来源
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS | 2009年 / 5922卷
关键词
signcryption; multi-user security; generic construction; PUBLIC-KEY ENCRYPTION; HYBRID ENCRYPTION; SHORT SIGNATURES; SECURE; KEM/DEM;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we investigate simple but efficient constructions of signcryption schemes. Firstly, we show how symmetric primitives can be used to efficiently achieve outsider multi-user security, leading to a signcryption scheme with the currently lowest ciphertext and computational overhead. For the mixed security notions outsider confidentiality/insider unforgeability and insider confidentiality/outsider unforgeability, this approach yields lower ciphertext overhead and a higher level of security, respectively, compared to the current schemes. Secondly, we show a simple optimization to the well known "sign-then-encrypt" and "encrypt-then-sign" approaches to the construction of signcryption schemes by using tag-based encryption. Instantiations with our proposed tag-based schemes yield multi-user insider secure signcryption schemes in the random oracle model which is at least as efficient as any other existing scheme both in terms of ciphertext overhead and computational cost. Furthermore, we show that very efficient standard model signcryption schemes can be constructed using this technique as well. Lastly, we show how signatures and encryption can be combined in a non-black-box manner to achieve higher efficiency than schemes based on the above approach. We refer to signature and encryption schemes which can be combined in this way as signcryption composable, and we show that a number of the most efficient standard model encryption and signature schemes satisfy this, leading to the most efficient standard model signcryption schemes. Since all of our constructions are fairly simple and efficient, they provide a benchmark which can be used to evaluate future signcryption schemes.
引用
收藏
页码:321 / 342
页数:22
相关论文
共 50 条
  • [31] Signcryption schemes with insider security in an ideal permutation model
    Bansal, Tarun Kumar
    Boyen, Xavier
    Pieprzyk, Josef
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2019, 13 (02) : 117 - 150
  • [32] Efficient Certificateless Signcryption from Bilinear Pairings
    Du, Hongzhen
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 303 - 316
  • [33] Efficient proxy signcryption scheme with provable CCA and CMA security
    Lin, Han-Yu
    Wu, Tzong-Sun
    Huang, Shih-Kun
    Yeh, Yi-Shiung
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (07) : 1850 - 1858
  • [34] An efficient identity based generalized signcryption scheme
    Kushwah, Prashant
    Lal, Sunder
    THEORETICAL COMPUTER SCIENCE, 2011, 412 (45) : 6382 - 6389
  • [35] Certificateless signcryption scheme in the standard model
    Liu, Zhenhua
    Hu, Yupu
    Zhang, Xiangsong
    Ma, Hua
    INFORMATION SCIENCES, 2010, 180 (03) : 452 - 464
  • [36] An efficient heterogeneous signcryption scheme for internet of things
    Zhou, Penghui
    Jin, Chunhua
    Chen, Zhiwei
    Chen, Guanhua
    Wang, Lanfang
    PERVASIVE AND MOBILE COMPUTING, 2023, 94
  • [37] A provably secure and efficient certificateless signcryption scheme
    Sun, H. (sh1227@163.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09): : 6911 - 6919
  • [38] An Efficient Signcryption Algorithm using Bilinear Mapping
    Verma, Vandani
    Gupta, Deepika
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 680 - 682
  • [39] A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT
    Jin, Chunhua
    Li, Chenhao
    Qin, Wenyu
    Chen, Xiaobing
    Chen, Guanhua
    FRONTIERS IN CYBER SECURITY, FCS 2022, 2022, 1726 : 3 - 17
  • [40] Efficient short signcryption scheme with public verifiability
    Ma, Changshe
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 118 - 129