Certificateless Signcryption Scheme From Lattice

Certificateless signcryption can simultaneously provide certificateless signature and encryption. In recent years, many certificateless signcryption schemes have been proposed. However, these schemes are based on traditional mathematical theory and not have the ability of resisting the quantum computing attacks. Up to now, lattice-based certificateless signature or encryption schemes have been proposed; however, these schemes only have one function and cannot fulfill two functions of certificateless signature and encryption at the same time. In consideration of this reason, in this article, a certificateless signcryption scheme from lattice (L-CLSS) is constructed. L-CLSS has three advantages. First, in the random oracle model, it is provably indistinguishable against adaptive ciphertext-chosen attacks under the intractability of the learning with errors (LWE) problem and unforgeable against adaptive message-chosen attacks under the hardness of small integer solution (SIS) problem. Second, comparison with the cryptographic algorithms under the difficulty of large integer decomposition, L-CLSS can resist the quantum computing attacks. Third, L-CLSS has higher computation efficiency and a lower communication cost than the existing schemes.

[1]  Han Jiang,et al.  A New Post-Quantum Blind Signature From Lattice Assumptions , 2018, IEEE Access.

[2]  Hejun Xuan,et al.  Improved Lattice-Based Signcryption in the Standard Model , 2019, IEEE Access.

[3]  Sayan Rakshit,et al.  Lattice Based Cryptography : Its Applications, Areas of Interest & Future Scope , 2019, 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC).

[4]  Yuh-Min Tseng,et al.  Revocable Certificateless Public Key Encryption , 2015, IEEE Systems Journal.

[5]  Liusheng Huang,et al.  Certificateless and certificate-based signatures from lattices , 2015, Secur. Commun. Networks.

[6]  Lin Sun,et al.  An efficient RSA-based certificateless public key encryption scheme , 2017, Discret. Appl. Math..

[7]  Ying-Hao Hung,et al.  Lattice-Based Revocable Certificateless Signature , 2017, Symmetry.

[8]  Mianxiong Dong,et al.  Identity-based signcryption from lattices , 2015, Secur. Commun. Networks.

[9]  K. Itakura,et al.  A public-key cryptosystem suitable for digital multisignatures , 1983 .

[10]  Dan Boneh,et al.  Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures , 2011, Public Key Cryptography.

[11]  François Gérard,et al.  Post-Quantum Signcryption From Lattice-Based Signatures , 2018, IACR Cryptol. ePrint Arch..

[12]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[13]  Jian Weng,et al.  New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model , 2017, ICICS.

[14]  Maciej Skorski,et al.  Inverted Leftover Hash Lemma , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).

[15]  Craig Gentry,et al.  Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..

[16]  Aarti Dadheech STUDY OF LATTICE BASED FHE FOR CLOUD DATA SECURITY , 2017 .

[17]  Wenbin Yao,et al.  Attribute-Based Signcryption From Lattices in the Standard Model , 2019, IEEE Access.

[18]  Daniele Micciancio,et al.  Asymptotically Efficient Lattice-Based Digital Signatures , 2018, Journal of Cryptology.

[19]  Weimin Zheng,et al.  An Identity-Based Ring Signcryption Scheme in Ideal Lattice , 2018, J. Netw. Intell..

[20]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[21]  Mingming Jiang,et al.  Certificateless Sequential Aggregate Signature Scheme on NTRU Lattice , 2019 .

[22]  Ron Steinfeld,et al.  Lattice-based certificateless public-key encryption in the standard model , 2013, International Journal of Information Security.

[23]  Wenbin Yao,et al.  Efficient Lattice-Based Signcryption in Standard Model , 2013 .

[24]  Miklós Ajtai,et al.  Generating Hard Instances of Lattice Problems , 1996, Electron. Colloquium Comput. Complex..

[25]  Chris Peikert,et al.  Generating Shorter Bases for Hard Random Lattices , 2009, Theory of Computing Systems.

[26]  Bo Yang,et al.  Low-computation certificateless hybrid signcryption scheme , 2017, Frontiers of Information Technology & Electronic Engineering.