• Overview of Chinese core journals
  • Chinese Science Citation Database(CSCD)
  • Chinese Scientific and Technological Paper and Citation Database (CSTPCD)
  • China National Knowledge Infrastructure(CNKI)
  • Chinese Science Abstracts Database(CSAD)
  • JST China
  • SCOPUS
LIAO Yucheng, WANG Libin, HUANG Jiebin. Design and Analysis of Hybrid Signcryption Scheme with Full Insider Security[J]. Journal of South China Normal University (Natural Science Edition), 2022, 54(6): 119-127. DOI: 10.6054/j.jscnun.2022093
Citation: LIAO Yucheng, WANG Libin, HUANG Jiebin. Design and Analysis of Hybrid Signcryption Scheme with Full Insider Security[J]. Journal of South China Normal University (Natural Science Edition), 2022, 54(6): 119-127. DOI: 10.6054/j.jscnun.2022093

Design and Analysis of Hybrid Signcryption Scheme with Full Insider Security

More Information
  • Received Date: November 23, 2021
  • Available Online: February 13, 2023
  • Currently, it is of significant importance to design a hybrid signcryption scheme (HSC) with full insider security, and one of the crucial methods is to implement an efficient and secure signcryption key encapsulation mechanism (SC-KEM). To this goal, a new generic construction scheme (HSCstd) of secure signcryption tag key encapsulation mechanism (SC-tag-KEM) is proposed, which signing a tag together with the encapsulation of key, and using message authentication code binding of the signature and the ephemeral key to achieve DM-IND-iCCA security and DM-SUF-iCMA security under the standard model, thus the foundation for full insider security is established. Furthermore, combined with the passive-secure symmetric encryption scheme, a new generic construction (HSCstd) of hybrid signcryption scheme achieving the full insider security is presented. It is analysed to achieve DM-CCA2 security and SUF-CMA security under the standard model, thus achieving the full insider security.
  • [1]
    ZHENG Y. Digital signcryption or how to achieve cost(signature & encryption) ≪ cost(signature) + cost(encryption)[C]//Advances in Cryptology — CRYPTO'97. Berlin: Springer, 1997: 165-179.
    [2]
    DENTA W. Hybrid signcryption schemes with insider security[C]//Proceedings of the 10th Australasian Conferen-ce on Information Security and Privacy. Berlin: Springer, 2005: 253-266.
    [3]
    YAN J, WANG L, WANG L, et al. Efficient lattice-based signcryption in standard model[J]. Mathematical Pro-blems in Engineering, 2013, 2013: 1-18.
    [4]
    SATO S, SHIKATA J. Lattice-based signcryption without random oracle[C]//Post-Quantum Cryptography. Cham: Springer, 2018: 331-351.
    [5]
    WANG C H, WANG F H. Post-quantum secure hybrid ring signcryption scheme from lattice assumption[C]//Proceedings of the 2015 4th International Conference on Computer, Mechatronics, Control and Electronic Enginee-ring. Hangzhou: Atlantis, 2015: 960-963.
    [6]
    MICCIANCIO D, PEIKERT C. Trapdoors for lattices: simpler, tighter, faster, smaller[C]//Advances in Cryptology-EUROCRYPT 2012. Berlin: Springer, 2012: 700-718.
    [7]
    路秀华, 温巧燕, 王励成, 等. 无陷门格基签密方案[J]. 电子与信息学报, 2016, 38(9): 2287-2293. https://www.cnki.com.cn/Article/CJFDTOTAL-DZYX201609024.htm

    LU X H, WEN Q Y, WANG L C, et al. A lattice-based signcryption scheme without trapdoors[J]. Journal of Electronics Technology, 2016, 38(9): 2287-2293. https://www.cnki.com.cn/Article/CJFDTOTAL-DZYX201609024.htm
    [8]
    GÉRARD F, MERCKX K. Setla: signature and encryption from lattices[C]//Cryptology and Network Security. Cham: Springer, 2018: 299-320.
    [9]
    BJØRSTAD T E, DENT A W. Building better signcryption schemes with Tag-KEMs[C]//Proceedings of the 9th International Conference on Theory and Practice of Public-Key Cryptography. Berlin: Springer, 2006: 491-507.
    [10]
    AN J H, DODIS Y, RABIN T. On the security of joint signature and encryption[C]//Advances in Cryptology—EUROCRYPT 2002. Berlin: Springer, 2002: 83-107.
    [11]
    LI F, MUHAYA F B, KHAN M, et al. Lattice-based signcryption[J]. Concurrency and Computation: Pratice and Experience, 2013, 25(14): 2112-2122. doi: 10.1002/cpe.2826
    [12]
    LU X, WEN Q, JIN Z, et al. A lattice-based signcryption scheme without random oracles[J]. Frontiers of Computer Science, 2014, 8(4): 667-675. doi: 10.1007/s11704-014-3163-1
    [13]
    刘镇, 韩益亮, 杨晓元, 等. 基于RLWE的可证明安全无陷门签密方案[J]. 通信学报, 2020, 41(6): 14-25. https://www.cnki.com.cn/Article/CJFDTOTAL-TXXB202006002.htm

    LIU Z, HAN Y L, YANG X Y, et al. Provable security signcryption scheme based on RLWE without trapdoor[J]. Journal on Communications, 2020, 41(6): 14-25. https://www.cnki.com.cn/Article/CJFDTOTAL-TXXB202006002.htm
    [14]
    YANG X, CAO H, LI W, et al. Improved lattice-based signcryption in the standard model[J]. IEEE Access, 2019, 7(1): 155552-155562.
    [15]
    CHOU T. An IND-CCA2 attack against the 1st- and 2nd-round versions of NTS-KEM[C]// Innovative Security Solutions for Information Technology and Communications: 13th International Conference. Cham: Springer, 2020: 165-184.
    [16]
    BRENDEL J, CREMERS C, JACKSON D, et al. The provable security of ed25519: theory and practice[C]//Secu-rity and Privacy. San Francisco: IEEE, 2021: 1659-1676.
    [17]
    CHIBA D, MATSUDA T, SCHULDT J C N, et al. Efficient generic constructions of signcryption with insider security in the multiuser setting[C]//Proceedings of the 9th International Conference on Applied Cryptography and Network Security. Berlin: Springer, 2011: 220-237.

Catalog

    Article views (454) PDF downloads (30) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return