An Efficient Heterogeneous Signcryption Scheme from Certificateless to Identity-based Cryptosystem

The heterogeneous signcryption can not only realize the confidentiality and un-forgeability of the information transmission between different public key cryptography environments, but also reduce the communication cost. The proposed scheme uses bilin-ear pairings between certificateless cryptography and identity-based cryptography to construct a heterogeneous signcryption scheme. In addition, two cryptography systems use different secret master keys. Furthermore, the proposed scheme has the indistin-guishability against adaptive chosen ciphertext attacks and existential unforgeability against adaptive chosen-message attacks in the random oracle model. Through the data analysis, this scheme is more effective than other similar types of scheme.

[1]  Jayaprakash Kar,et al.  Certificateless Public Key Cryptography: A Research Survey , 2016 .

[2]  Xiaotong Fu,et al.  IDPKC-to-TPKC Construction of Multi-receiver Signcryption , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.

[3]  Yahong Li,et al.  Privacy-preserving multi-receiver signcryption scheme for heterogeneous systems , 2016, Secur. Commun. Networks.

[4]  Hui Li,et al.  Efficient signcryption between TPKC and IDPKC and its multi-receiver construction , 2010, Science China Information Sciences.

[5]  Fagen Li,et al.  Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks , 2008, Inscrypt.

[6]  Tal Rabin,et al.  On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.

[7]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[8]  Chunhua Jin,et al.  Practical access control for sensor networks in the context of the Internet of Things , 2016, Comput. Commun..

[9]  Robert H. Deng,et al.  Variations of Diffie-Hellman Problem , 2003, ICICS.

[10]  Siu-Ming Yiu,et al.  Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity , 2003, ICISC.

[11]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[12]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[13]  Hui Zhang,et al.  Efficient Signcryption for Heterogeneous Systems , 2013, IEEE Systems Journal.

[14]  Guomin Yang,et al.  Heterogeneous Signcryption with Key Privacy , 2011, Comput. J..