Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains

被引:2
|
作者
Chen, Tzung-Her [1 ]
Zhu, Ting-Le [1 ]
Jeng, Fuh-Gwo [2 ]
Wang, Chien-Lung [3 ]
机构
[1] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi 60004, Taiwan
[2] Natl Chiayi Univ, Dept Appl Math, Chiayi 60004, Taiwan
[3] Natl Chung Hsing Univ, Informat Secur Res Ctr, Taichung 40227, Taiwan
关键词
IDENTITY-BASED SIGNCRYPTION; CERTIFICATELESS SIGNCRYPTION; INTERNET;
D O I
10.1155/2021/6637402
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although encryption and signatures have been two fundamental technologies for cryptosystems, they still receive considerable attention in academia due to the focus on reducing computational costs and communication overhead. In the past decade, applying certificateless signcryption schemes to solve the higher cost of maintaining the certificate chain issued by a certificate authority (CA) has been studied. With the recent increase in the interest in blockchains, signcryption is being revisited as a new possibility. The concepts of a blockchain as a CA and a transaction as a certificate proposed in this paper aim to use a blockchain without CAs or a trusted third party (TTP). The proposed provably secure signcryption scheme implements a designated recipient beforehand such that a sender can cryptographically facilitate the interoperation on the blockchain information with the designated recipient. Thus, the proposed scheme benefits from the following advantages: (1) it removes the high maintenance cost from involving CAs or a UP, (2) it seamlessly integrates with blockchains, and (3) it provides confidential transactions. This paper also presents the theoretical security analysis and assesses the performance via the simulation results. Upon evaluating the operational cost in real currency based on Ethereum, the experimental results demonstrate that the proposed scheme only requires a small cost as a fee.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Provably Secure Aggregate Signcryption Scheme
    Ren, Xun-Yi
    Qi, Zheng-Hua
    Geng, Yang
    [J]. ETRI JOURNAL, 2012, 34 (03) : 421 - 428
  • [2] Provably Secure Certificateless Ring Signcryption Scheme
    Qi Zhenghua
    Yang Geng
    Ren Xunyi
    [J]. CHINA COMMUNICATIONS, 2011, 8 (03) : 99 - 106
  • [3] A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings
    Lo, Nai-Wei
    Tsai, Jia-Lun
    [J]. JOURNAL OF APPLIED MATHEMATICS, 2014,
  • [4] A provably secure ID-based mediated signcryption scheme
    Yu, Yong
    Yang, Bo
    Sun, Ying
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 647 - +
  • [5] Provably Secure Homomorphic Signcryption
    Rezaeibagha, Fatemeh
    Mu, Yi
    Zhang, Shiwei
    Wang, Xiaofen
    [J]. PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 349 - 360
  • [6] Provably secure leakage-resilient certificateless hybrid signcryption scheme
    [J]. Yang, Bo (byang@snnu.edu.cn), 2016, Chinese Academy of Sciences (27):
  • [7] Provably Secure Certificate-Based Signcryption Scheme without Pairings
    Lu, Yang
    Li, Jiguo
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (07): : 2554 - 2571
  • [8] Provably Secure General Aggregate Signcryption Scheme in the Random Oracle Model
    Qi Zhenghua
    Ren Xunyi
    Yang Geng
    [J]. CHINA COMMUNICATIONS, 2012, 9 (11) : 107 - 116
  • [9] An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme
    Li, Fagen
    Yu, Yong
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 547 - 551
  • [10] Practical Provably Secure Flooding for Blockchains
    Liu-Zhang, Chen-Da
    Matt, Christian
    Maurer, Ueli
    Rito, Guilherme
    Thomsen, Soren Eller
    [J]. ADVANCES IN CRYPTOLOGY- ASIACRYPT 2022, PT I, 2022, 13791 : 774 - 805