Advanced Search
Volume 39 Issue 5
May  2017
Turn off MathJax
Article Contents
NIU Shufen, NIU Ling, WANG Caifen, DU Xiaoni. A Provable Aggregate Signcryption for Heterogeneous Systems[J]. Journal of Electronics & Information Technology, 2017, 39(5): 1213-1218. doi: 10.11999/JEIT160829
Citation: NIU Shufen, NIU Ling, WANG Caifen, DU Xiaoni. A Provable Aggregate Signcryption for Heterogeneous Systems[J]. Journal of Electronics & Information Technology, 2017, 39(5): 1213-1218. doi: 10.11999/JEIT160829

A Provable Aggregate Signcryption for Heterogeneous Systems

doi: 10.11999/JEIT160829
Funds:

The National Natural Science Foundation of China (61562077, 61462077, 61662071), The Young Teachers Scientific Research Ability Promotion Program of Northwest Normal University (NWNU-LKQN-13-12)

  • Received Date: 2016-08-15
  • Rev Recd Date: 2017-01-13
  • Publish Date: 2017-05-19
  • Heterogeneous signcryption can ensure the confidentiality, authentication and unforgeability of information transmission of cross cryptograph environment. Through analyzing some existing heterogeneous signcryption schemes, it is found that they can only be applicable to single message of signcryption. In order to improve the efficiency of computation and transmission in heterogeneous systems, a provable multi-message aggregate signcryption is proposed. In the new scheme, the pairing numbers are constant in verification phase, it not depends on the number of signcryption message. Moreover, based on the assumption of q-bilinear Diffie- Hellman inversion issue and Discrete logarithm, in the random oracle model, it is proved that the new scheme satisfies the properties of confidentiality and unforgeability. Furthermore, theoretical analysis and experimental results demonstrate that the computation overhead efficiency of the proposed scheme is better than the existing one.
  • loading
  • ZHENG Yuliang. Digital signcryption or how to achieve cost(signature encryption)cost(signature) +cost (encryption)[C]. Proceedings of the Cryptology-CRYPTO, 1997, California, USA, 1997: 165-179. doi: 10.1007/ BFb0052234.
    BAEK J, STEINFELD R, and ZHENG Yuliang. Formal proofs for the security of signcryption[C]. Proceedings of the Cryptology-PKC2002, Paris, France, 2002: 81-98. doi: 10. 1007/3-540-45664-3_6.
    PANG Liaojun, GAO Lu, LI Huixian, et al. Anonymous multi-receiver ID-based signcryption scheme[J]. Iet Information Security, 2015, 9(3): 194-201. doi: 10.1049/ iet-ifs.2014.0360.
    LI Fagen, ZHANG Hui, and TSUYOSHI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420-429. doi: 10.1109/JSYST.2012. 2221897.
    张雪, 冀会芳, 李光松, 等. 基于身份的跨信任域签密方案[J]. 计算机科学, 2015, 42(5): 165-168. doi: 10.11896/j.issn.1002- 137X.2015.5.033.
    ZHANG Xue, JI Huifang, LI Guangsong, et al. Identity-based signcryption cross autonomous domains[J]. Computer Science, 2015, 42(5): 165-168. doi: 10.11896/j.issn.1002-137X. 2015.5.033.
    ZHOU Yanwei, YANG Bo, and ZHANG Wenzheng. Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing[J]. Discrete Applied Mathematics, 2016, 204(C): 185-202. doi: 10.1016/ j.dam.2015.10.018.
    LI Fagen, HAN Yanan, and JIN Chunhua. Practical signcryption for secure communication of wireless sensor networks[J]. Wireless Personal Communications, 2016, 89(4): 1391-1412. doi: 10.1007/s11277-016-3327-4.
    SUN Yinxia and LI Hui. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Sciece China Information Sciences, 2010, 53(3): 557-566. doi: 10.1007/s11432-010-0061-5.
    HUANG Qiong, WONG D S, and YANG Guomin. Heterogeneous signcryption with key privacy[J]. Computer Journal, 2011, 54(4): 525-536. doi: 10.1093/comjnl/bxq095.
    张玉磊, 王欢, 李臣意, 等. 可证安全的紧致无证书聚合签密方案[J]. 电子与信息学报, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
    ZHANG Yulei, WANG Huan, LI Chenyi, et al. Provable secure and compact certificateless aggregate signcryption scheme[J]. Journal of Electronics Information Technology, 2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407.
    WANG Hao, LIU Zhen, LIU Zhe, et al. Identity-based aggregate signcryption in the standard model from multilinear maps[J]. Frontiers of Computer Science, 2016, 10(4): 741-754. doi: 10.1007/s11704-015-5138-2.
    HAN Yiliang and CHEN Fei. The multilinear maps based certificateless aggregate signcryption scheme[C]. IEEE International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Xian, China, 2015: 92-99. doi: 10.1109/CyberC.2015.93.
    ESLAMI Z and PAKNIAT N. Certificateless aggregate signcryption[J]. Journal of King Saud University-Computer and Information Sciences, 2014, 26(3): 276-286. doi: 10. 1016/j.jksuci.2014.03.006.
    CHEN Juqin and REN Xiaoxi. A privacy protection scheme based on certificateless aggregate signcryption and masking random number in smart grid[C]. International Conference on Mechanical Materials and Manufacturing Engineering, Wuhan, China, 2016: 10-13. doi: 10.2991/mmme-16.2016.3.
    DAVID P and JACQUES S. Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000, 13(3): 361-396. doi: 10.1007=s001450010003.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1153) PDF downloads(274) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return