Skip to main content
Log in

Low-computation certificateless hybrid signcryption scheme

  • Published:
Frontiers of Information Technology & Electronic Engineering Aims and scope Submit manuscript

Abstract

Hybrid signcryption is an important technique signcrypting bulk data using symmetric encryption. In this paper, we apply the technique of certificateless hybrid signcryption to an elliptic-curve cryptosystem, and construct a low-computation certificateless hybrid signcryption scheme. In the random oracle model, this scheme is proven to have indistinguishability against adaptive chosen-ciphertext attacks (IND-CCA2) under the elliptic-curve computation Diffie-Hellman assumption. Also, it has a strong existential unforgeability against adaptive chosen-message attacks (sUF-CMA) under the elliptic-curve discrete logarithm assumption. Analysis shows that the cryptographic algorithm does not rely on pairing operations and is much more efficient than other algorithms. In addition, it suits well to applications in environments where resources are constrained, such as wireless sensor networks and ad hoc networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Dent, A.W., 2005. Hybrid signcryption schemes with insider security. LNCS, 3574: 253–266. http://dx.doi.org/10.1007/11506157_22

    MATH  Google Scholar 

  • Hwang, R.J., Lai, C.H., Su, F.F., 2005. An efficient signcryp-tion scheme with forward secrecy based on elliptic curve. Appl. Math. Comput., 167: 870–881. http://dx.doi.org/10.1016/j.amc.2004.06.124

    MathSciNet  MATH  Google Scholar 

  • Koblitz, N., 1987. Elliptic curve cryptosystems. Math. Com-put., 48(177): 203–209. http://dx.doi.org/10.1090/S0025-5718-1987-0866109-5

    Article  MathSciNet  MATH  Google Scholar 

  • Li, F.G., Liao, Y.J., Qin, Z.G., et al., 2012. Further improve-ment of an identity-based signcryption scheme in the standard model. Comput. Electr. Eng., 38(2): 413–421. http://dx.doi.org/10.1016/j.compe-leceng.2011.11.001

    Article  MATH  Google Scholar 

  • Li, F.G., Shirase, M., Takagi, T., 2013. Certificateless hybrid signcryption. Math. Comput. Model., 57(3–4): 324–343. http://dx.doi.org/10.1016/j.mcm.2012.06.011

    Article  MathSciNet  MATH  Google Scholar 

  • Li, F.G., Zheng, Z.H., Jin, C.H., 2016. Identity-based deniable authenticated encryption and its application to e-mail system. Telecommun. Syst., 62(4): 625–639. http://dx.doi.org/10.1007/s11235-015-0099-1

    Article  Google Scholar 

  • Pang, L.J., Cui, J.J., Li, H.X., et al., 2011. A new multi-receiver ID-based anonymous signcryption. Chin. J. Comput., 34(11): 2104–2113. http://dx.doi.org/10.3724/SP.J.1016.2011.02104

    Google Scholar 

  • Sun, Y.X., Li, H., 2011. Efficient certificateless hybrid sign-cryption. J. Softw., 22(7): 1690–1698. http://dx.doi.org/10.3724/SP.J.1001.2011.03825

    Article  MathSciNet  Google Scholar 

  • Szczechowiak, P., Oliveira, L.B., Scott, M., et al., 2008. Testing the limits of elliptic curve cryptography in sensor networks. LNCS, 4913: 305–320. http://dx.doi.org/10.1007/978-3-540-77690-1_19

    Google Scholar 

  • Tan, C.H., 2008. Insider-secure signcryption KEM/tag-KEM schemes without random oracles. 3rd Int. Conf. on Availability, Reliability and Security, p.1275–1281. http://dx.doi.org/10.1109/ARES.2008.112

    Google Scholar 

  • Wang, D.X., Teng, J.K., 2015. Provably secure identity-based aggregate signcryption scheme. J. Comput. Appl., 35(2): 412–415. http://dx.doi.org/10.11772/j.issn.1001-9081.2015.02.0412

    MathSciNet  Google Scholar 

  • Wang, F.H., Hu, Y.P., Wang, C.X., 2012. Post-quantum secure hybrid signcryption from lattice assumption. Appl. Math. Inform. Sci., 6(1): 23–28.

    MathSciNet  MATH  Google Scholar 

  • Youn, T.Y., Hong, D., 2012. Signcryption with fast online signing and short signcryptext for secure and private communication. Sci. China Inform. Sci., 55(11): 2530–2541. http://dx.doi.org/10.1007/s11432-012-4635-2

    Article  MathSciNet  MATH  Google Scholar 

  • Yu, H.F., Yang, B., 2015a. Identity-based hybrid signcryption scheme using ECC. J. Softw., 26(12): 3174–3182. http://dx.doi.org/10.13328/j.cnki.jos.004819

    MathSciNet  MATH  Google Scholar 

  • Yu, H.F., Yang, B., 2015b. Provable secure certificateless hybrid signcryption. Chin. J. Comput., 38(4): 804–813. http://dx.doi.org/10.3724/SP.J.1016.2015.00804

    Google Scholar 

  • Zhang, B., Xu, Q.L., 2010. Identity-based multi-signcryption scheme without random oracles. Chin. J. Comput., 33(1): 103–110. http://dx.doi.org/10.3724/SP.J.1016.2010.00103

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hui-fang Yu.

Additional information

Project supported by the National Natural Science Foundation of China (Nos. 61572303, 61363080, and 61272436), the Foundation of State Key Laboratory of Information Security (No. 2015-MS-10), and the Foundation of Basic Research of Qinghai Province, China (No. 2016-ZJ-776)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yu, Hf., Yang, B. Low-computation certificateless hybrid signcryption scheme. Frontiers Inf Technol Electronic Eng 18, 928–940 (2017). https://doi.org/10.1631/FITEE.1601054

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1631/FITEE.1601054

Key words

CLC number

Navigation