Efficient Constructions of Signcryption Schemes and Signcryption Composability

被引:0
|
作者
Matsuda, Takahiro [1 ]
Matsuura, Kanta [1 ]
Schuldt, Jacob C. N. [1 ]
机构
[1] Univ Tokyo, Tokyo 1138654, Japan
来源
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS | 2009年 / 5922卷
关键词
signcryption; multi-user security; generic construction; PUBLIC-KEY ENCRYPTION; HYBRID ENCRYPTION; SHORT SIGNATURES; SECURE; KEM/DEM;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we investigate simple but efficient constructions of signcryption schemes. Firstly, we show how symmetric primitives can be used to efficiently achieve outsider multi-user security, leading to a signcryption scheme with the currently lowest ciphertext and computational overhead. For the mixed security notions outsider confidentiality/insider unforgeability and insider confidentiality/outsider unforgeability, this approach yields lower ciphertext overhead and a higher level of security, respectively, compared to the current schemes. Secondly, we show a simple optimization to the well known "sign-then-encrypt" and "encrypt-then-sign" approaches to the construction of signcryption schemes by using tag-based encryption. Instantiations with our proposed tag-based schemes yield multi-user insider secure signcryption schemes in the random oracle model which is at least as efficient as any other existing scheme both in terms of ciphertext overhead and computational cost. Furthermore, we show that very efficient standard model signcryption schemes can be constructed using this technique as well. Lastly, we show how signatures and encryption can be combined in a non-black-box manner to achieve higher efficiency than schemes based on the above approach. We refer to signature and encryption schemes which can be combined in this way as signcryption composable, and we show that a number of the most efficient standard model encryption and signature schemes satisfy this, leading to the most efficient standard model signcryption schemes. Since all of our constructions are fairly simple and efficient, they provide a benchmark which can be used to evaluate future signcryption schemes.
引用
收藏
页码:321 / 342
页数:22
相关论文
共 50 条
  • [41] Functional Signcryption
    Datta, Pratish
    Dutta, Ratna
    Mukhopadhyay, Sourav
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 42 : 118 - 134
  • [42] Comments on A Signcryption
    YOU Lin 1
    2. Beijing University of Posts and Telecommunications
    The Journal of China Universities of Posts and Telecommunications, 2002, (03) : 28 - 31
  • [43] A Method of identifying cheaters in secret sharing schemes based on signcryption
    Cai, Yumei
    Zeng, Jiwen
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4655 - 4658
  • [44] Known session key attack against a collection of signcryption schemes
    Wong, DS
    Wong, J
    SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 119 - 124
  • [45] Identity Based Online/Offline Encryption and Signcryption Schemes Revisited
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 111 - 127
  • [46] Coded Modulation and the Arrival of Signcryption
    Zheng, Yuliang
    ENHANCING CRYPTOGRAPHIC PRIMITIVES WITH TECHNIQUES FROM ERROR CORRECTING CODES, 2009, 23 : 17 - 27
  • [47] Heterogeneous Signcryption With Equality Test for IIoT Environment
    Xiong, Hu
    Zhao, Yanan
    Hou, Yingzhe
    Huang, Xin
    Jin, Chuanjie
    Wang, Lili
    Kumari, Saru
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (21) : 16142 - 16152
  • [48] Efficient signcryption scheme based on Cocks' identity cryptosystem
    Peng C.
    Zhang X.
    Ding H.
    Yang S.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (12): : 128 - 138
  • [49] An Efficient Online/Offline Heterogeneous Signcryption Scheme With Equality Test for IoVs
    Hou, Yingzhe
    Cao, Yue
    Xiong, Hu
    Song, Yujie
    Xu, Lexi
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (09) : 12047 - 12062
  • [50] An efficient identity-based broadcast signcryption scheme
    Luo, Ming
    Zou, Chunhua
    Xu, Jianfeng
    Journal of Software, 2012, 7 (02) : 366 - 373