Citation: | LIAO Yucheng, WANG Libin, HUANG Jiebin. Design and Analysis of Hybrid Signcryption Scheme with Full Insider Security[J]. Journal of South China Normal University (Natural Science Edition), 2022, 54(6): 119-127. DOI: 10.6054/j.jscnun.2022093 |
[1] |
ZHENG Y. Digital signcryption or how to achieve cost(signature & encryption) ≪ cost(signature) + cost(encryption)[C]//Advances in Cryptology — CRYPTO'97. Berlin: Springer, 1997: 165-179.
|
[2] |
DENTA W. Hybrid signcryption schemes with insider security[C]//Proceedings of the 10th Australasian Conferen-ce on Information Security and Privacy. Berlin: Springer, 2005: 253-266.
|
[3] |
YAN J, WANG L, WANG L, et al. Efficient lattice-based signcryption in standard model[J]. Mathematical Pro-blems in Engineering, 2013, 2013: 1-18.
|
[4] |
SATO S, SHIKATA J. Lattice-based signcryption without random oracle[C]//Post-Quantum Cryptography. Cham: Springer, 2018: 331-351.
|
[5] |
WANG C H, WANG F H. Post-quantum secure hybrid ring signcryption scheme from lattice assumption[C]//Proceedings of the 2015 4th International Conference on Computer, Mechatronics, Control and Electronic Enginee-ring. Hangzhou: Atlantis, 2015: 960-963.
|
[6] |
MICCIANCIO D, PEIKERT C. Trapdoors for lattices: simpler, tighter, faster, smaller[C]//Advances in Cryptology-EUROCRYPT 2012. Berlin: Springer, 2012: 700-718.
|
[7] |
路秀华, 温巧燕, 王励成, 等. 无陷门格基签密方案[J]. 电子与信息学报, 2016, 38(9): 2287-2293. https://www.cnki.com.cn/Article/CJFDTOTAL-DZYX201609024.htm
LU X H, WEN Q Y, WANG L C, et al. A lattice-based signcryption scheme without trapdoors[J]. Journal of Electronics Technology, 2016, 38(9): 2287-2293. https://www.cnki.com.cn/Article/CJFDTOTAL-DZYX201609024.htm
|
[8] |
GÉRARD F, MERCKX K. Setla: signature and encryption from lattices[C]//Cryptology and Network Security. Cham: Springer, 2018: 299-320.
|
[9] |
BJØRSTAD T E, DENT A W. Building better signcryption schemes with Tag-KEMs[C]//Proceedings of the 9th International Conference on Theory and Practice of Public-Key Cryptography. Berlin: Springer, 2006: 491-507.
|
[10] |
AN J H, DODIS Y, RABIN T. On the security of joint signature and encryption[C]//Advances in Cryptology—EUROCRYPT 2002. Berlin: Springer, 2002: 83-107.
|
[11] |
LI F, MUHAYA F B, KHAN M, et al. Lattice-based signcryption[J]. Concurrency and Computation: Pratice and Experience, 2013, 25(14): 2112-2122. doi: 10.1002/cpe.2826
|
[12] |
LU X, WEN Q, JIN Z, et al. A lattice-based signcryption scheme without random oracles[J]. Frontiers of Computer Science, 2014, 8(4): 667-675. doi: 10.1007/s11704-014-3163-1
|
[13] |
刘镇, 韩益亮, 杨晓元, 等. 基于RLWE的可证明安全无陷门签密方案[J]. 通信学报, 2020, 41(6): 14-25. https://www.cnki.com.cn/Article/CJFDTOTAL-TXXB202006002.htm
LIU Z, HAN Y L, YANG X Y, et al. Provable security signcryption scheme based on RLWE without trapdoor[J]. Journal on Communications, 2020, 41(6): 14-25. https://www.cnki.com.cn/Article/CJFDTOTAL-TXXB202006002.htm
|
[14] |
YANG X, CAO H, LI W, et al. Improved lattice-based signcryption in the standard model[J]. IEEE Access, 2019, 7(1): 155552-155562.
|
[15] |
CHOU T. An IND-CCA2 attack against the 1st- and 2nd-round versions of NTS-KEM[C]// Innovative Security Solutions for Information Technology and Communications: 13th International Conference. Cham: Springer, 2020: 165-184.
|
[16] |
BRENDEL J, CREMERS C, JACKSON D, et al. The provable security of ed25519: theory and practice[C]//Secu-rity and Privacy. San Francisco: IEEE, 2021: 1659-1676.
|
[17] |
CHIBA D, MATSUDA T, SCHULDT J C N, et al. Efficient generic constructions of signcryption with insider security in the multiuser setting[C]//Proceedings of the 9th International Conference on Applied Cryptography and Network Security. Berlin: Springer, 2011: 220-237.
|