Efficient Constructions of Signcryption Schemes and Signcryption Composability

被引:0
|
作者
Matsuda, Takahiro [1 ]
Matsuura, Kanta [1 ]
Schuldt, Jacob C. N. [1 ]
机构
[1] Univ Tokyo, Tokyo 1138654, Japan
关键词
signcryption; multi-user security; generic construction; PUBLIC-KEY ENCRYPTION; HYBRID ENCRYPTION; SHORT SIGNATURES; SECURE; KEM/DEM;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we investigate simple but efficient constructions of signcryption schemes. Firstly, we show how symmetric primitives can be used to efficiently achieve outsider multi-user security, leading to a signcryption scheme with the currently lowest ciphertext and computational overhead. For the mixed security notions outsider confidentiality/insider unforgeability and insider confidentiality/outsider unforgeability, this approach yields lower ciphertext overhead and a higher level of security, respectively, compared to the current schemes. Secondly, we show a simple optimization to the well known "sign-then-encrypt" and "encrypt-then-sign" approaches to the construction of signcryption schemes by using tag-based encryption. Instantiations with our proposed tag-based schemes yield multi-user insider secure signcryption schemes in the random oracle model which is at least as efficient as any other existing scheme both in terms of ciphertext overhead and computational cost. Furthermore, we show that very efficient standard model signcryption schemes can be constructed using this technique as well. Lastly, we show how signatures and encryption can be combined in a non-black-box manner to achieve higher efficiency than schemes based on the above approach. We refer to signature and encryption schemes which can be combined in this way as signcryption composable, and we show that a number of the most efficient standard model encryption and signature schemes satisfy this, leading to the most efficient standard model signcryption schemes. Since all of our constructions are fairly simple and efficient, they provide a benchmark which can be used to evaluate future signcryption schemes.
引用
收藏
页码:321 / 342
页数:22
相关论文
共 50 条
  • [1] Signcryption schemes with anonymity
    Wei B.
    Ou H.
    Tian H.
    Gao C.
    International Journal of Advancements in Computing Technology, 2011, 3 (08) : 127 - 137
  • [3] Efficient identity-based broadcast signcryption schemes
    Kim, Intae
    Hwang, Seong Oun
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) : 914 - 925
  • [4] Efficient distributed signcryption scheme as group signcryption
    Kwak, DJ
    Moon, SJ
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 403 - 417
  • [5] How to construct efficient signcryption schemes on elliptic curves
    Zheng, YL
    Imai, H
    INFORMATION PROCESSING LETTERS, 1998, 68 (05) : 227 - 233
  • [6] Cryptanalysis and improvement of signcryption schemes
    Petersen, H
    Michels, M
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1998, 145 (02): : 149 - 151
  • [7] Cryptoanalysis of Two Signcryption Schemes
    Zhang, Jianhong
    Geng, Qin
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 65 - 68
  • [8] Identity-Based Proxy Signcryption Protocol with Universal Composability
    Yu, Huifang
    Wang, Zhicang
    Li, Jianmin
    Gao, Xinzhe
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [9] Construction of Identity Based Signcryption Schemes
    Pandey, Sumit Kumar
    Barua, Rana
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 1 - 14
  • [10] Identity Based Aggregate Signcryption Schemes
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Shriram, J.
    Kalaivani, S.
    Rangan, C. Pandu
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 378 - +