Efficient Constructions of Signcryption Schemes and Signcryption Composability

被引:0
|
作者
Matsuda, Takahiro [1 ]
Matsuura, Kanta [1 ]
Schuldt, Jacob C. N. [1 ]
机构
[1] Univ Tokyo, Tokyo 1138654, Japan
关键词
signcryption; multi-user security; generic construction; PUBLIC-KEY ENCRYPTION; HYBRID ENCRYPTION; SHORT SIGNATURES; SECURE; KEM/DEM;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we investigate simple but efficient constructions of signcryption schemes. Firstly, we show how symmetric primitives can be used to efficiently achieve outsider multi-user security, leading to a signcryption scheme with the currently lowest ciphertext and computational overhead. For the mixed security notions outsider confidentiality/insider unforgeability and insider confidentiality/outsider unforgeability, this approach yields lower ciphertext overhead and a higher level of security, respectively, compared to the current schemes. Secondly, we show a simple optimization to the well known "sign-then-encrypt" and "encrypt-then-sign" approaches to the construction of signcryption schemes by using tag-based encryption. Instantiations with our proposed tag-based schemes yield multi-user insider secure signcryption schemes in the random oracle model which is at least as efficient as any other existing scheme both in terms of ciphertext overhead and computational cost. Furthermore, we show that very efficient standard model signcryption schemes can be constructed using this technique as well. Lastly, we show how signatures and encryption can be combined in a non-black-box manner to achieve higher efficiency than schemes based on the above approach. We refer to signature and encryption schemes which can be combined in this way as signcryption composable, and we show that a number of the most efficient standard model encryption and signature schemes satisfy this, leading to the most efficient standard model signcryption schemes. Since all of our constructions are fairly simple and efficient, they provide a benchmark which can be used to evaluate future signcryption schemes.
引用
收藏
页码:321 / 342
页数:22
相关论文
共 50 条
  • [21] An efficient signcryption scheme with key privacy and its extension to ring signcryption
    Li, Chung
    Yang, Guomin
    Wong, Duncan
    Deng, Xiaotie
    Chow, Sherman
    JOURNAL OF COMPUTER SECURITY, 2010, 18 (03) : 451 - 473
  • [22] Efficient ID-Based Ring Signature and Ring Signcryption Schemes
    Zhu, Lijun
    Zhang, Futai
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 866 - 870
  • [23] Efficient Signcryption for Heterogeneous Systems
    Li, Fagen
    Zhang, Hui
    Takagi, Tsuyoshi
    IEEE SYSTEMS JOURNAL, 2013, 7 (03): : 420 - 429
  • [24] Efficient Certificateless Signcryption Scheme
    Yu, Gang
    Yang, Hongzhi
    Fan, Shuqin
    YongShen
    Han, Wenbao
    THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 55 - 59
  • [25] New efficient signcryption scheme
    Communications Research Center, Harbin Institute of Technology, Harbin 150001, China
    Nanjing Li Gong Daxue Xuebao, 2006, 6 (739-741+754):
  • [26] A New Efficient Blind Signcryption
    YU Xiuying
    WuhanUniversityJournalofNaturalSciences, 2008, (06) : 662 - 664
  • [27] Efficient and proactive threshold signcryption
    Ma, CS
    Chen, KF
    Zheng, D
    Liu, SL
    INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 233 - 243
  • [28] Efficient signcryption in the standard model
    Li, Fagen
    Zhang, Mingwu
    Takagi, Tsuyoshi
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (17): : 1977 - 1989
  • [29] On the Security of Identity Based Ring Signcryption Schemes
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 310 - 325
  • [30] Distributed Signcryption Schemes with Formal Proof of Security
    Gupta, Indivar
    Saxena, P. K.
    SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 93 - 110