Skip to main content
Log in

New multivariate-based certificateless hybrid signcryption scheme for multi-recipient

  • Cryptology
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

With the development of quantum computer, multivariate public key cryptography withstanding quantum attack has became one of the research focus. The existed signcryption schemes from discrete logarithm and bilinear paring are facing the serious threats. Based on multivariate public key cryptography, a new certificateless multi-receiver hybrid signcryption scheme has been proposed. The proposal reduced the cipher text and could handle arbitrary length messages by employing randomness reusing and hybrid encryption, as well as keeping security. In the random oracle model, the scheme’s confidentiality could withstand the IND-CCA2 adversary and its unforgeability could withstand the UF-CMA adversary under the hardness of multivariate quadratic (MQ) problem and isomorphism of polynomials (IP) assumption. It has less computation overhead and higher transmission efficiency than others. It reduced 33% cipher data compared with the existed similar scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Matsumot T, Imai H. Public quadratic polynomial-tuples for efficient signature-verification and message-encryption [C]// EUROCRYPT’1988, LNCS 330. Heidelberg: Springer-Verlag, 1988: 419–453.

    Google Scholar 

  2. Tsujii S, Kurosawa K, Itoh T, et al. A public-key crypto-system based on a quantum computer [J]. SIAM J Computing, 1997, 26:1484–1509.

    Article  Google Scholar 

  3. Patarin J. Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms[C] // Advances in Cryptology-Eurocrypt’96. Berlin, Heidelberg: Springer-Verlag, 1996: 33–48.

    Google Scholar 

  4. Akkar M L, Courtois N, Goubin L, et al. A fast and secure implementation of Sflash [C]// PKC’2003, LNCS 2567, Heidelberg: Springer-Verlag, 2002: 267–278.

    Google Scholar 

  5. Kipins A, Patarin J, Goubin L. Unbalanced oil and vinegar signature scheme [C]//CRYPTO’1999, LNCS 1666. Heidelberg: Springer-Verlag, 1999: 19–30.

    Google Scholar 

  6. Ding J, Schmidt D. Rainbow, a new multivariate polynomial sdignature scheme[C]//ACNS’2005, LNCS 3531. Heidelberg: Springer-Verlag, 2005: 164–175.

    Google Scholar 

  7. Zheng Y L. Digital signcryption or how to achieve cost (signature & encryption) cost (signature) + cost (encryption) [C] // Cryptology’1997, LNCS 1294. Heidelberg: Springer-Verlag, 1997: 165–179.

    Google Scholar 

  8. Malone-Lee J. Identity-Based Signcryption[EB/OL]. [2002-07-19]. IACR Cryptology ePrint Archive, Report 2002/098. http://eprint.iacr.org/2002/098.

  9. Barbosa M, Farshim P. Certificateless signcryption[C] //Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. New York: ACM Press, 2008: 369–372.

    Google Scholar 

  10. Dent A W. Hybrid signcryption schemes with outsider security [C]// Information Security, LNCS 3650. Heidelberg: Springer-Verlag, 2005: 203–217.

    Chapter  Google Scholar 

  11. Selvi S S D, Vivek S S, Shukla D, et al. Efficient and provably secure certificateless multi-receiver signcryption [C]//Provable Security, LNCS 5324. Heidelberg: Springer-Verlag, 2008: 52–67.

    Chapter  Google Scholar 

  12. Li F, Shirase M, Takagi T. Certificateless hybrid signcryption [C]// Information Security Practice and Experience, LNCS 5451. Heidelberg: Springer-Verlag, 2009: 112–123.

    Chapter  Google Scholar 

  13. Li H, Chen X, Pang L. Certificateless multi-receiver signcryption scheme based on multivariate public key cryptography [J]. Chinese Journal of Computers, 2012, 35(9): 1881–1889.

    Google Scholar 

  14. Bellare M, Boldyreva A, Kurosawa K, et al. Multi-recipient encryption schemes: How to save on bandwidth and computation without sacrificing security [J]. IEEE Transactions on Information Theory, 2007, 53(11): 3927–3943.

    Article  Google Scholar 

  15. Han Y L, Gui X. Adaptive secure multicast in wireless network [J]. International Journal Communication System, 2009, 22(9): 1213–1239.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yiliang Han.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (61103231, 61103230, 61272492, 61202492), the Project Funded by China Postdoctoral Science Foundation and Natural Science Basic Research Plan in Shaanxi Province of China (2014JQ8358, 2014JQ8307, 2014JM8300)

Biography: HAN Yiliang, male, Ph.D., Associate professor, Senior member of CCF, research directions: cryptology and information security.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Han, Y., Yue, Z., Fang, D. et al. New multivariate-based certificateless hybrid signcryption scheme for multi-recipient. Wuhan Univ. J. Nat. Sci. 19, 433–440 (2014). https://doi.org/10.1007/s11859-014-1036-y

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-014-1036-y

Key words

CLC number

Navigation