Abstract
Hybrid signcryption is an important technique signcrypting bulk data using symmetric encryption. In this paper, we apply the technique of certificateless hybrid signcryption to an elliptic-curve cryptosystem, and construct a low-computation certificateless hybrid signcryption scheme. In the random oracle model, this scheme is proven to have indistinguishability against adaptive chosen-ciphertext attacks (IND-CCA2) under the elliptic-curve computation Diffie-Hellman assumption. Also, it has a strong existential unforgeability against adaptive chosen-message attacks (sUF-CMA) under the elliptic-curve discrete logarithm assumption. Analysis shows that the cryptographic algorithm does not rely on pairing operations and is much more efficient than other algorithms. In addition, it suits well to applications in environments where resources are constrained, such as wireless sensor networks and ad hoc networks.
Similar content being viewed by others
References
Dent, A.W., 2005. Hybrid signcryption schemes with insider security. LNCS, 3574: 253–266. http://dx.doi.org/10.1007/11506157_22
Hwang, R.J., Lai, C.H., Su, F.F., 2005. An efficient signcryp-tion scheme with forward secrecy based on elliptic curve. Appl. Math. Comput., 167: 870–881. http://dx.doi.org/10.1016/j.amc.2004.06.124
Koblitz, N., 1987. Elliptic curve cryptosystems. Math. Com-put., 48(177): 203–209. http://dx.doi.org/10.1090/S0025-5718-1987-0866109-5
Li, F.G., Liao, Y.J., Qin, Z.G., et al., 2012. Further improve-ment of an identity-based signcryption scheme in the standard model. Comput. Electr. Eng., 38(2): 413–421. http://dx.doi.org/10.1016/j.compe-leceng.2011.11.001
Li, F.G., Shirase, M., Takagi, T., 2013. Certificateless hybrid signcryption. Math. Comput. Model., 57(3–4): 324–343. http://dx.doi.org/10.1016/j.mcm.2012.06.011
Li, F.G., Zheng, Z.H., Jin, C.H., 2016. Identity-based deniable authenticated encryption and its application to e-mail system. Telecommun. Syst., 62(4): 625–639. http://dx.doi.org/10.1007/s11235-015-0099-1
Pang, L.J., Cui, J.J., Li, H.X., et al., 2011. A new multi-receiver ID-based anonymous signcryption. Chin. J. Comput., 34(11): 2104–2113. http://dx.doi.org/10.3724/SP.J.1016.2011.02104
Sun, Y.X., Li, H., 2011. Efficient certificateless hybrid sign-cryption. J. Softw., 22(7): 1690–1698. http://dx.doi.org/10.3724/SP.J.1001.2011.03825
Szczechowiak, P., Oliveira, L.B., Scott, M., et al., 2008. Testing the limits of elliptic curve cryptography in sensor networks. LNCS, 4913: 305–320. http://dx.doi.org/10.1007/978-3-540-77690-1_19
Tan, C.H., 2008. Insider-secure signcryption KEM/tag-KEM schemes without random oracles. 3rd Int. Conf. on Availability, Reliability and Security, p.1275–1281. http://dx.doi.org/10.1109/ARES.2008.112
Wang, D.X., Teng, J.K., 2015. Provably secure identity-based aggregate signcryption scheme. J. Comput. Appl., 35(2): 412–415. http://dx.doi.org/10.11772/j.issn.1001-9081.2015.02.0412
Wang, F.H., Hu, Y.P., Wang, C.X., 2012. Post-quantum secure hybrid signcryption from lattice assumption. Appl. Math. Inform. Sci., 6(1): 23–28.
Youn, T.Y., Hong, D., 2012. Signcryption with fast online signing and short signcryptext for secure and private communication. Sci. China Inform. Sci., 55(11): 2530–2541. http://dx.doi.org/10.1007/s11432-012-4635-2
Yu, H.F., Yang, B., 2015a. Identity-based hybrid signcryption scheme using ECC. J. Softw., 26(12): 3174–3182. http://dx.doi.org/10.13328/j.cnki.jos.004819
Yu, H.F., Yang, B., 2015b. Provable secure certificateless hybrid signcryption. Chin. J. Comput., 38(4): 804–813. http://dx.doi.org/10.3724/SP.J.1016.2015.00804
Zhang, B., Xu, Q.L., 2010. Identity-based multi-signcryption scheme without random oracles. Chin. J. Comput., 33(1): 103–110. http://dx.doi.org/10.3724/SP.J.1016.2010.00103
Author information
Authors and Affiliations
Corresponding author
Additional information
Project supported by the National Natural Science Foundation of China (Nos. 61572303, 61363080, and 61272436), the Foundation of State Key Laboratory of Information Security (No. 2015-MS-10), and the Foundation of Basic Research of Qinghai Province, China (No. 2016-ZJ-776)
Rights and permissions
About this article
Cite this article
Yu, Hf., Yang, B. Low-computation certificateless hybrid signcryption scheme. Frontiers Inf Technol Electronic Eng 18, 928–940 (2017). https://doi.org/10.1631/FITEE.1601054
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1631/FITEE.1601054