An efficient identity-based proxy signcryption using lattice

Abstract Signcryption combines the functionalities of digital signature and encryption in a single step, which promises to increase the efficiency and the confidentiality of on-line transactions. Identity-based proxy signcryption integrates the functions of identity-based cryptography, proxy signature and signcryption. However, identity-based proxy signcryption constructed on the discrete logarithm and the integer factoring problems cannot defeat quantum attack. Therefore, the paper proposes a lattice-based identity-based proxy signcryption since there are none efficient quantum algorithms to attack lattice-based cryptography. The constructed scheme has the properties of both signcryption and proxy signature, i.e., the constructed scheme has ind-cca2 security, suf-cma security, strong identifiability, strong undeniability and key dependence properties. Comparing with the known identity-based proxy signcryption, the proposed scheme needs smaller computation complexity, smaller secret key size and smaller signature tuple size. Besides, the proposed scheme does not depend on the public key infrastructure since it is an identity-based cryptography.

[1]  Caixue Zhou,et al.  Identity Based Generalized Proxy Signcryption Scheme , 2016, Inf. Technol. Control..

[2]  Yuan Xue,et al.  An Identity-Based Proxy Signature on NTRU Lattice , 2018 .

[3]  Hu Xiong,et al.  A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing , 2020, KSII Trans. Internet Inf. Syst..

[4]  Xiaojiang Du,et al.  Biometric-based authentication scheme for Implantable Medical Devices during emergency situations , 2019, Future Gener. Comput. Syst..

[5]  Sherali Zeadally,et al.  A brief overview of intelligent mobility management for future wireless mobile networks , 2017, EURASIP J. Wirel. Commun. Netw..

[6]  Xiaojun Zhang,et al.  A post-quantum communication secure identity-based proxy-signcryption scheme , 2015, Int. J. Electron. Secur. Digit. Forensics.

[7]  Xiaojiang Du,et al.  Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet , 2007, IEEE Communications Magazine.

[8]  Yingying Zhang,et al.  Multi-proxy Multi-signature without Pairing from Certificateless Cryptography , 2018, Int. J. Netw. Secur..

[9]  Roayat Ismail Abdelfatah,et al.  A Novel Proxy Signcryption Scheme and its Elliptic Curve Variant , 2017 .

[10]  Kim-Kwang Raymond Choo,et al.  A smartphone-based wearable sensors for monitoring real-time physiological data , 2017, Comput. Electr. Eng..

[11]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[12]  Kofi Sarpong Adu-Manu,et al.  Prolonging the Lifetime of Wireless Sensor Networks: A Review of Current Techniques , 2018, Wirel. Commun. Mob. Comput..

[13]  Jian Shen,et al.  A Short Linearly Homomorphic Proxy Signature Scheme , 2018, IEEE Access.

[14]  Yaser Jararweh,et al.  An intrusion detection system for connected vehicles in smart cities , 2019, Ad Hoc Networks.

[15]  Zhiyuan Tan,et al.  Social-aware peer discovery and resource allocation for device-to-device communication , 2016, 2016 Digital Media Industry & Academic Forum (DMIAF).

[16]  Xiaoqi Ma Managing Identities in Cloud Computing Environments , 2015, 2015 2nd International Conference on Information Science and Control Engineering.

[17]  Longfei Wu,et al.  Cross-lingual multi-keyword rank search with semantic extension over encrypted data , 2020, Inf. Sci..

[18]  Gautam Srivastava,et al.  A Node Density Control Learning Method for the Internet of Things , 2019, Sensors.

[19]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[20]  Johannes A. Buchmann,et al.  Perspectives for cryptographic long-term security , 2006, CACM.

[21]  P. Pardalos,et al.  Group testing with geometry of classical groups over finite fields , 2018, Journal of Algebraic Combinatorics.

[22]  Yong Gan,et al.  A Self-certified Cross-Cluster Asymmetric Group Key Agreement for Wireless Sensor Networks , 2019 .

[23]  Fahad Bin Muhaya,et al.  Lattice‐based signcryption , 2013, Concurr. Comput. Pract. Exp..

[24]  Jianmin Li,et al.  Identity-Based Proxy Signcryption Protocol with Universal Composability , 2018, Secur. Commun. Networks.

[25]  Y. Sreenivasa Rao,et al.  A secure and efficient Ciphertext-Policy Attribute-Based Signcryption for Personal Health Records sharing in cloud computing , 2017, Future Gener. Comput. Syst..

[26]  P. Vasudeva Reddy,et al.  Pairing Free Identity-Based Blind Signature Scheme with Message Recovery , 2017, Cryptogr..

[27]  Vadim Lyubashevsky,et al.  Lattice Signatures Without Trapdoors , 2012, IACR Cryptol. ePrint Arch..

[28]  Huifang Yu,et al.  Construction of Certificateless Proxy Signcryption Scheme From CMGs , 2019, IEEE Access.

[29]  Mianxiong Dong,et al.  Identity-based signcryption from lattices , 2015, Secur. Commun. Networks.

[30]  Liusheng Huang,et al.  Identity-based Signatures from Lattices: Simpler, Faster, Shorter , 2016, Fundam. Informaticae.

[31]  Craig Gentry,et al.  Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..

[32]  Chunhua Su,et al.  Am I eclipsed? A smart detector of eclipse attacks for Ethereum , 2020, Comput. Secur..

[33]  Longfei Wu,et al.  EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid , 2019, Science China Information Sciences.

[34]  Shaobo Zhang,et al.  A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services , 2019, Future Gener. Comput. Syst..

[35]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[36]  Chen Liang,et al.  Building covert timing channels by packet rearrangement over mobile networks , 2018, Inf. Sci..

[37]  Chen Liang,et al.  A sensitive network jitter measurement for covert timing channels over interactive traffic , 2018, Multimedia Tools and Applications.

[38]  Li Li,et al.  An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System , 2018, Secur. Commun. Networks.

[39]  Liehuang Zhu,et al.  A packet-reordering covert channel over VoLTE voice and video traffics , 2019, J. Netw. Comput. Appl..

[40]  Fagen Li,et al.  Efficient Signcryption With Proxy Re-Encryption and its Application in Smart Grid , 2019, IEEE Internet of Things Journal.

[41]  Yaser Jararweh,et al.  Data and Service Management in Densely Crowded Environments: Challenges, Opportunities, and Recent Developments , 2019, IEEE Communications Magazine.

[42]  Qiming Zou,et al.  Research on Cost-Driven Services Composition in an Uncertain Environment , 2019 .

[43]  Yueshen Xu,et al.  QoS Prediction for Service Recommendation with Deep Feature Learning in Edge Computing Environment , 2019, Mob. Networks Appl..

[44]  Qiaoyan Wen,et al.  Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation , 2019, Symmetry.

[45]  Guangquan Xu,et al.  A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems , 2020, IEEE Transactions on Industrial Informatics.

[46]  Victor C. M. Leung,et al.  Virtual Resource Allocation for Heterogeneous Services in Full Duplex-Enabled SCNs With Mobile Edge Computing and Caching , 2017, IEEE Transactions on Vehicular Technology.

[47]  Yu Li,et al.  Group-Wise Itinerary Planning in Temporary Mobile Social Network , 2019, IEEE Access.

[48]  Gautam Srivastava,et al.  A Decentralized Privacy-Preserving Healthcare Blockchain for IoT , 2019, Sensors.

[49]  Kim-Kwang Raymond Choo,et al.  GDTN: Genome-Based Delay Tolerant Network Formation in Heterogeneous 5G Using Inter-UA Collaboration , 2016, PloS one.

[50]  Honghao Gao,et al.  Applying Probabilistic Model Checking to Path Planning in an Intelligent Transportation System Using Mobility Trajectories and Their Statistical Data , 2019, Intelligent Automation and Soft Computing.