Advanced Search
Volume 39 Issue 4
Apr.  2017
Turn off MathJax
Article Contents
WANG Caifen, LI Yahong, ZHANG Yulei, NIU Shufen. Efficient Heterogeneous Signcryption Scheme in the Standard Model[J]. Journal of Electronics & Information Technology, 2017, 39(4): 881-886. doi: 10.11999/JEIT160662
Citation: WANG Caifen, LI Yahong, ZHANG Yulei, NIU Shufen. Efficient Heterogeneous Signcryption Scheme in the Standard Model[J]. Journal of Electronics & Information Technology, 2017, 39(4): 881-886. doi: 10.11999/JEIT160662

Efficient Heterogeneous Signcryption Scheme in the Standard Model

doi: 10.11999/JEIT160662
Funds:

The National Natural Science Foundation of China (61163038, 61562077, 61662069), Research Fund of Higher Education of Gansu Province (2014-A011), The Foundation for Excellent Young Teachers by Northwest Normal University (NWNU-LKQN-14-7)

  • Received Date: 2016-06-24
  • Rev Recd Date: 2016-12-13
  • Publish Date: 2017-04-19
  • Heterogeneous signcryption scheme can ensure the confidentiality and the authentication?for data communication between different security domains. Some existing heterogeneous signcryption schemes are analyzed to be secure in the random oracle model. Based on this problem, an Identity-Based Cryptography (IBC) to Public Key Infrastructure (PKI) signcryption scheme is proposed. The proposed scheme has the confidentiality and the unforgeability under the Computational Diffie-Hellman (CDH) problem and the Decisional Bilinear Diffie-HellmanB (DBDH) problem. Through the theoretical and experimental analysis, both the computational costs and the communication overheads of the proposed scheme are more efficient.
  • loading
  • ZHENG Y. Digital signcryption or how to achieve cost (signature encryption)cost(signature)+cost (encryption)[C]. Proceedings of the Cryptology- CRYPTO1997, California, USA, 1997: 165-179. doi: 10. 1007/BFb0052234.
    PAN Chunhua, LI Shunpeng, ZHU Qihui, et al. Notes on proxy signcryption and multi-proxy signature schemes[J]. International Journal of Network Security, 2015, 17(1): 29-33.
    项顺伯, 徐兵, 柯文德. 基于身份的在线/离线广播签密方案[J]. 四川大学学报(工程科学版), 2016, 48(2): 156-161. doi: 10.1007/BFb0052234.10.15961/j.jsuese.2016.02.023.
    XIANG Shunbo, XU Bing, and KE Wende. Identity-based online /offline broadcast signcryption scheme[J]. Journal of Sichuan University (Engineer Science), 2016, 48(2): 156-161. doi: 10.1007/BFb0052234.10.15961/j.jsuese.2016.02.023.
    李慧贤, 巨龙飞. 对一个匿名多接收者签密方案的安全性分析与改进[J]. 电子学报, 2015, 43(11): 2187-2193. doi:10.3969 /j. issn.0372-2112.2015.11.008.
    LI Huixian and JU Longfei. Security analysis and improvement of an anonymous multi-receiver signcryption scheme[J]. Acta Electronica Sinica, 2015, 43(11): 2187-2193. doi: 10.3969/j.issn.0372-2112.2015.11.008.
    张玉磊, 王欢, 李臣意, 等. 可证安全的紧致无证书聚合签密方案[J]. 电子与信息学报, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
    ZHANG Yulei, WANG Huan, LI Chenyi, et al. Provable secure and compact certificateless aggregate signcryption Scheme[J]. Journal of Electronics Information Technology, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
    刘雪峰, 张玉清, 王鹤, 等. 一种后向撤销隐私安全的车载自组织网络快速匿名消息认证协议[J]. 电子与信息学报, 2014, 36(1): 94-100. doi: 10.3724/SP.J.1146.2013.00342.
    LIU Xuefeng, ZHANG Yuqing, WANG He, et al. An efficient anonymity message authentication with backward secure revocation for vehicular Ad hoc networks[J]. Journal of Electronics Information Technology, 2014, 36(1): 94-100. doi: 10.3724/SP.J.1146.2013.00342.
    张宇, 陈晶, 杜瑞颖, 等. 适于车载网安全通信的高效签密方案[J]. 电子学报, 2015, 43(3): 512-517. doi: 10.3969/j.issn. 0372-2112.2015.03.015.
    ZHANG Yu, CHEN Jing, DU Ruiying, et al. An efficient signcryption scheme for secure communication of VANET[J]. Acta Electronica Sinica, 2015, 43(3): 512-517. doi: 10.3969/j. issn.0372-2112.2015.03.015.
    TAN C. Signcryption scheme in multi-user setting without random oracles[C]. Proceedings of the 3rd International Workshop on Security, Kagawa, Japan, 2008: 64-82. doi: 10.1007/978-3-540-89598-5_5.
    LI Fageng and TAKAGI T. Secure identity-based signcryption in the standard model[J]. Mathematical Computer Modelling, 2013, 57(11/12): 2685-2694. doi: 10.1016/j.mcm.2011.06.043.
    LI Xiangxue, QIAN Haifeng, WENG Jian, et al. Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model[J]. Mathematical Computer Modelling, 2013, 57(3/4): 503-511. doi: 10.1016/j.mcm. 2012.06.030.
    LI Fageng, ZHANG Mingwu, and TSUYOSHI T. Efficient signcryption in the standard model[J]. Concurrency Computation Practice Experience, 2012, 24(17): 1977-1989. doi: 10.1002/cpe.1823.
    SUN Yinxia and LI Hui. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Sciece China Information Sciences, 2010, 53(3): 557-566. doi: 10.1007/s11432-010-0061-5.
    HUANG Qiong, DUN C, and YAN Guomin. Heterogeneous signcryption with key privacy[J]. Computer Journal, 2011, 54(4): 525-536. doi: 10.1093/comjnl/bxq095.
    LI Fageng, ZHANG Hui, and TAKAGI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420-429. doi: 10.1109/JSYST.2012. 2221897.
    SHOUP V. OAEP Reconsidered[J]. Journal of Cryptology, 2000, 15(4): 223-249. doi: 10.1007/3-540-44647-8_15.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1175) PDF downloads(391) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return