Efficient online/offline signcryption without key exposure

An online/offline signcryption scheme provides confidentiality and authentication simultaneously, and it is particularly suitable for the application of resource-constrained systems. In this paper, we present a key-exposure free online/offline signcryption scheme. In contrast, it seems that all the existing online/offline signcryption schemes based on Shamir-Tauman's paradigm suffer from the key exposure problem. In the random oracle model, the proposed scheme is proved to be indistinguishable against adaptive chosen-ciphertext attacks IND-CCA2 and existentially unforgeable against chosen-message attacks EUF-CMA. Besides, an improved scheme is proposed, which requires none of the recipient's public information in the offline phase and hence makes practical sense.

[1]  Jean-Jacques Quisquater,et al.  A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[2]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[3]  Liqun Chen,et al.  Improved Identity-Based Signcryption , 2005, Public Key Cryptography.

[4]  Yi Mu,et al.  Reducing security overhead for mobile networks , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[5]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[6]  Dongqing Xie,et al.  Divisible On-Line/Off-Line Signatures , 2009, CT-RSA.

[7]  Silvio Micali,et al.  On-line/off-line digital signatures , 1996, Journal of Cryptology.

[8]  Xiaofeng Chen,et al.  Efficient Online/Offline Signcryption Scheme , 2010, Intell. Autom. Soft Comput..

[9]  Xavier Boyen,et al.  Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.

[10]  Hugo Krawczyk,et al.  Chameleon Hashing and Signatures , 1998, IACR Cryptol. ePrint Arch..

[11]  Yi Mu,et al.  Efficient generic on-line/off-line (threshold) signatures without key exposure , 2008, Inf. Sci..

[12]  Giuseppe Ateniese,et al.  On the Key Exposure Problem in Chameleon Hashes , 2004, SCN.

[13]  A. Shamir,et al.  Improved On-line / Off-line Signature Schemes , 2022 .

[14]  Yi Mu,et al.  Efficient Generic On-Line/Off-Line Signatures Without Key Exposure , 2007, ACNS.

[15]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[16]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[17]  Silvio Micali,et al.  On-Line/Off-Line Digital Schemes , 1989, CRYPTO.

[18]  Giuseppe Ateniese,et al.  Identity-Based Chameleon Hash and Applications , 2004, Financial Cryptography.

[19]  Tal Rabin,et al.  On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.

[20]  Yuliang Zheng,et al.  Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite , 2001, Public Key Cryptography.

[21]  Lein Harn,et al.  Efficient On-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families , 2010, Comput. J..

[22]  Fuchun Guo,et al.  Optimal Online/Offline Signature: How to Sign a Message without Online Computation , 2008, ProvSec.

[23]  Yi Mu,et al.  Identity-Based On-Line/Off-Line Signcryption , 2008, 2008 IFIP International Conference on Network and Parallel Computing.

[24]  Yael Tauman Kalai,et al.  Improved Online/Offline Signature Schemes , 2001, CRYPTO.

[25]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[26]  Fuchun Guo,et al.  Identity-Based Online/Offline Encryption , 2008, Financial Cryptography.

[27]  Jacques Stern,et al.  Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.

[28]  Joonsang Baek,et al.  Online/Offline Identity-Based Signcryption Revisited , 2010, Inscrypt.

[29]  Kwangjo Kim,et al.  Chameleon Hashing Without Key Exposure , 2004, ISC.

[30]  Joseph K. Liu,et al.  An Efficient Identity-Based Online/Offline Encryption Scheme , 2009, ACNS.