Efficient Constructions of Signcryption Schemes and Signcryption Composability

被引:0
|
作者
Matsuda, Takahiro [1 ]
Matsuura, Kanta [1 ]
Schuldt, Jacob C. N. [1 ]
机构
[1] Univ Tokyo, Tokyo 1138654, Japan
关键词
signcryption; multi-user security; generic construction; PUBLIC-KEY ENCRYPTION; HYBRID ENCRYPTION; SHORT SIGNATURES; SECURE; KEM/DEM;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we investigate simple but efficient constructions of signcryption schemes. Firstly, we show how symmetric primitives can be used to efficiently achieve outsider multi-user security, leading to a signcryption scheme with the currently lowest ciphertext and computational overhead. For the mixed security notions outsider confidentiality/insider unforgeability and insider confidentiality/outsider unforgeability, this approach yields lower ciphertext overhead and a higher level of security, respectively, compared to the current schemes. Secondly, we show a simple optimization to the well known "sign-then-encrypt" and "encrypt-then-sign" approaches to the construction of signcryption schemes by using tag-based encryption. Instantiations with our proposed tag-based schemes yield multi-user insider secure signcryption schemes in the random oracle model which is at least as efficient as any other existing scheme both in terms of ciphertext overhead and computational cost. Furthermore, we show that very efficient standard model signcryption schemes can be constructed using this technique as well. Lastly, we show how signatures and encryption can be combined in a non-black-box manner to achieve higher efficiency than schemes based on the above approach. We refer to signature and encryption schemes which can be combined in this way as signcryption composable, and we show that a number of the most efficient standard model encryption and signature schemes satisfy this, leading to the most efficient standard model signcryption schemes. Since all of our constructions are fairly simple and efficient, they provide a benchmark which can be used to evaluate future signcryption schemes.
引用
收藏
页码:321 / 342
页数:22
相关论文
共 50 条
  • [31] New DSA-verifiable signcryption schemes
    Shin, JB
    Lee, K
    Shim, K
    IFORMATION SECURITY AND CRYPTOLOGY - ICISC 2002, 2002, 2587 : 35 - 47
  • [32] Certificateless KEM and Hybrid Signcryption Schemes Revisited
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 294 - 307
  • [33] Cryptanalysis of Two Identity Based Signcryption Schemes
    Xia, Qi
    Xu, Chunxiang
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 292 - 294
  • [35] Identity-based proxy signcryption schemes
    Jian, Wu
    INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1237 - 1242
  • [36] Efficient signcryption without random oracles
    Wu, Qianhong
    Mu, Yi
    Susilo, Willy
    Zhang, Fangguo
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 449 - 458
  • [37] An Efficient Biometric Certificateless Signcryption Scheme
    Luo, Ming
    Huang, Donghua
    Hu, Jun
    JOURNAL OF COMPUTERS, 2013, 8 (07) : 1853 - 1860
  • [38] A New Efficient Certificateless Signcryption Scheme
    Wu, Chen-huang
    Chen, Zhi-xiong
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 661 - 664
  • [39] An Efficient Certificateless Generalized Signcryption Scheme
    Zhang, Bo
    Jia, Zhongtian
    Zhao, Chuan
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [40] An efficient heterogeneous signcryption for smart grid
    Jin, Chunhua
    Chen, Guanhua
    Yu, Changhui
    Shan, Jinsong
    Zhao, Jianyang
    Jin, Ying
    PLOS ONE, 2018, 13 (12):