Provably Secure General Aggregate Signcryption Scheme in the Random Oracle Model

被引:0
|
作者
Qi Zhenghua [1 ,2 ,3 ]
Ren Xunyi [1 ,2 ,3 ]
Yang Geng [1 ,3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing 210003, Jiangsu, Peoples R China
[2] Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Jiangsu, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Minist Educ, Key Lab Broadband Wireless Commun & Sensor Networ, Nanjing 210003, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
identity-based cryptography; signcryption; aggregate signature; bilinear pairing; IDENTITY; SIGNATURES; CURVES;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
To reduce the size of certificate chains and the ciphertext size in secure routing protocols, a General Aggregate Signcryption Scheme (GASC) is presented. In GASC, an identity-based signcryption algorithm and an aggregate signature algorithm are combined in a practical and secure manner to form the general aggregate signcryption scheme's schema and concept, and a new secure, efficiently general aggregate signcryption scheme, which allows the aggregation of n distinct signcryptions by n distinct users on n distinct messages, is proposed. First, the correction of the GASC scheme is analyzed. Then, we formally prove the security of GASC in the random oracle models IND-CCA2 and EUF-CMA under the DBDHP assumption and the DLP assumption, respectively. The results show that the GASC scheme is not only secure against any probabilistic polynomial-time IND-GASC-CCA2 and EUF-GASC-CMA adversary in the random oracle models but also efficient in pairing computations. In addition, the GASC scheme gives an effective remedy to the key escrow problem, which is an inherent issue in IBC by splitting the private key into two parts, and reduces the communication complexity by eliminating the interaction among the senders (signers) before the signcryption generation.
引用
收藏
页码:107 / 116
页数:10
相关论文
共 50 条
  • [41] Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing
    Zhou Yanwei
    Yang Bo
    Zhang Wenzheng
    [J]. DISCRETE APPLIED MATHEMATICS, 2016, 204 : 185 - 202
  • [42] MIDSCYK: An Efficient Provably Secure Multi-Recipient Identity-Based Signcryption Scheme
    Elkamchouchi, Hassan
    Abouelseoud, Yasmine
    [J]. ICNM: 2009 INTERNATIONAL CONFERENCE ON NETWORKING & MEDIA CONVERGENCE, 2007, : 70 - 75
  • [43] An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System
    Li, Li
    Zhou, Siqin
    Choo, Kim-Kwang Raymond
    Li, Xiaohong
    He, Debiao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [44] A New Lightweight and Secure Certificateless Aggregate Signcryption Scheme for Industrial Internet of Things
    Rao, Gopisetti Srinivasa
    Thumbur, Gowri
    Amarapu, Ramesh Babu
    Bhagya, Gayathri Nemani
    Reddy, P. Vasudeva
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) : 10563 - 10574
  • [45] Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments
    Karati, Arijit
    Islam, S. K. Hafizul
    Biswas, G. P.
    Bhuiyan, Md Zakirul Alam
    Vijayakumar, Pandi
    Karuppiah, Marimuthu
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 2904 - 2914
  • [46] Insider-secure hybrid signcryption scheme without random oracles
    Tan, Chik How
    [J]. ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 1148 - 1154
  • [47] Efficient and provably secure random oracle-free adaptive identity-based encryption with short-signature scheme
    Karati, Arijit
    Biswas, G. P.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4060 - 4074
  • [48] A provably secure aggregate authentication scheme for unmanned aerial vehicle cluster networks
    Wang Hong
    Li Jianhua
    Lai Chengzhe
    Wang Zhe
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (01) : 53 - 63
  • [49] A provably secure aggregate authentication scheme for unmanned aerial vehicle cluster networks
    Wang Hong
    Li Jianhua
    Lai Chengzhe
    Wang Zhe
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 53 - 63
  • [50] Provably secure certificateless encryption scheme in the standard model
    Deng, Lunzhi
    Xia, Tian
    He, Xiuru
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (06): : 2534 - 2553