Efficient multi-receiver identity-based signcryption from lattice assumption

被引:16
作者
Zhang, Xiaojun [1 ,2 ]
Xu, Chunxiang [1 ]
Xue, Jingting [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, 2006 Xi Yuan Ave, Chengdu 611731, Sichuan, Peoples R China
[2] Southwest Petr Univ, Sch Comp Sci, Xindu Ave,8,Xindu Zone, Chengdu 610500, Sichuan, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
multi-receiver signcryption; lattice assumption; post-quantum cryptography; learning with errors; LWE; small integer solution assumption; SIS;
D O I
10.1504/IJESDF.2018.10009828
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Signcryption is a public-key cryptographic primitive which combines the functions of public-key encryption and digital signature into a single logical step at low computational and communication costs. While multi-receiver signcryption is suited for a situation where a sender wants to send a signcrypted message to multiple receivers in a confidential and authenticated way. Due to this attractive property, recently, multi-receiver signcryption plays an important role in some practical applications such as virtual conference as well as authenticated mail transferring. In this paper, we present an efficient multi-receiver identity-based signcryption (MIBSC) scheme from lattice assumption which is believed to resist quantum computer attacks. The proposed scheme is provably secure in the random oracle model, which has the indistinguishability against chosen ciphertext attacks under the hardness of learning with errors (LWE), and existentially unforgeability against chosen message attacks under the small integer solution assumption (SIS). Moreover, we also compare our MIBSC scheme with existing schemes from performance efficiency and security, the result shows that our proposed scheme is more efficient and more secure. In particular, our scheme can be properly applied in the post-quantum communication environments.
引用
收藏
页码:20 / 38
页数:19
相关论文
共 34 条
[1]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
[2]  
Ajtai M., 1999, Automata, Languages and Programming. 26th International Colloquium, ICALP'99. Proceedings (Lecture Notes in Computer Science Vol.1644), P1
[3]  
Alwen J., 2009, STACS, V3, P75, DOI DOI 10.1007/978-3-642-13190-5_27
[4]   Formal proofs for the security of signcryption [J].
Baek, Joonsang ;
Steinfeld, Ron ;
Zheng, Yuliang .
JOURNAL OF CRYPTOLOGY, 2007, 20 (02) :203-235
[5]  
Barreto PSLM, 2005, LECT NOTES COMPUT SC, V3788, P515
[6]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P259
[7]  
Boyen X, 2003, LECT NOTES COMPUT SC, V2729, P383
[8]   Towards Tightly Secure Lattice Short Signature and Id-Based Encryption [J].
Boyen, Xavier ;
Li, Qinyi .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 :404-434
[9]   Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security [J].
Brakerski, Zvika ;
Vaikuntanathan, Vinod .
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 :363-384
[10]  
Chen LQ, 2005, LECT NOTES COMPUT SC, V3386, P362