A Signcryption Scheme Based on Secret Sharing Technique

Signcryption is a cryptographic primitive that performs signing and encryption simultaneously, at less cost than is required by the traditional signature-then-encryption approach. In this paper, a new signcryption scheme is proposed for the open problem posed by Zheng, and is based on Secret Sharing technique. The scheme is an “all-in-one” security approach: it provides privacy, authentication, integrity and non-repudiation, all with less computational cost as well as communication overhead. Yet, the scheme is not restricted to any particular cryptosystem and could be designed with any cryptographic cryptosystem.

[1]  Tatsuaki Okamoto,et al.  Advances in Cryptology — ASIACRYPT 2000 , 2000, Lecture Notes in Computer Science.

[2]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[3]  David Pointcheval,et al.  Parallel authentication and public-key encryption , 2003 .

[4]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[5]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[6]  JooSeok Song,et al.  Information Security and Cryptology - ICISC’99 , 1999, Lecture Notes in Computer Science.

[7]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[8]  Chanathip Namprempre,et al.  Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm , 2000, ASIACRYPT.

[9]  Mihir Bellare,et al.  Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..

[10]  Ron Steinfeld,et al.  A Signcryption Scheme Based on Integer Factorization , 2000, ISW.

[11]  Eiji Okamoto,et al.  Verfiable Secret Sharing and Time Capsules , 1999, ICISC.

[12]  Information Security and Privacy , 1996, Lecture Notes in Computer Science.

[13]  Aggelos Kiayias,et al.  Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.

[14]  Hugo Krawczyk,et al.  Advances in Cryptology - CRYPTO '98 , 1998 .

[15]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[16]  Tal Rabin,et al.  On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.

[17]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[18]  Burton S. Kaliski Advances in Cryptology - CRYPTO '97 , 1997 .

[19]  Pankaj Rohatgi,et al.  A compact and fast hybrid signature scheme for multicast packet authentication , 1999, CCS '99.