Quantum attack-resistent certificateless multi-receiver signcryption scheme
- PMID: 23967037
- PMCID: PMC3673999
- DOI: 10.1371/journal.pone.0049141
Quantum attack-resistent certificateless multi-receiver signcryption scheme
Abstract
The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.
Conflict of interest statement
Similar articles
-
An efficient certificateless anonymous signcryption communication scheme for vehicular adhoc network.Sci Rep. 2024 Nov 7;14(1):27079. doi: 10.1038/s41598-024-77992-5. Sci Rep. 2024. PMID: 39511283 Free PMC article.
-
An Efficient Electronic Cash System Based on Certificateless Group Signcryption Scheme Using Conformable Chaotic Maps.Sensors (Basel). 2021 Oct 23;21(21):7039. doi: 10.3390/s21217039. Sensors (Basel). 2021. PMID: 34770346 Free PMC article.
-
Heterogeneous hybrid signcryption for multi-message and multi-receiver.PLoS One. 2017 Sep 8;12(9):e0184407. doi: 10.1371/journal.pone.0184407. eCollection 2017. PLoS One. 2017. PMID: 28886125 Free PMC article.
-
A Comprehensive Survey on Signcryption Security Mechanisms in Wireless Body Area Networks.Sensors (Basel). 2022 Jan 29;22(3):1072. doi: 10.3390/s22031072. Sensors (Basel). 2022. PMID: 35161818 Free PMC article. Review.
-
Digital signature schemes with strong existential unforgeability.F1000Res. 2021 Sep 16;10:931. doi: 10.12688/f1000research.72910.1. eCollection 2021. F1000Res. 2021. PMID: 36798451 Free PMC article. Review.
Cited by
-
Robust multiple frequency multiple power localization schemes in the presence of multiple jamming attacks.PLoS One. 2017 May 11;12(5):e0177326. doi: 10.1371/journal.pone.0177326. eCollection 2017. PLoS One. 2017. PMID: 28493977 Free PMC article.
References
-
- Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption)<<cost (signature)+cost (encryption). In: Proc. 17th Annual International Cryptology Conference on Advances in Cryptology. 165–179.
-
- Luo M, Wen Y, Zhao H (2008) A certificate-based signcryption scheme. In: Proc. International Conference on Computer Science and Information Technology. 17–23.
-
- Pang LJ, Gao L, Pei QQ, Cui JJ, Wang YM (2013) A new ID-based multi-recipient public-key encryption scheme. Chinese Journal of Electronics 1: 89–92.
-
- AI-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: Proc. 9th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2003): 452–473.
-
- Barbosa M, Farshim P (2008) Certificateless signcryption. In: Proc. ACM Symposium on Information, Computer and Communications Security. 369–372.
Publication types
MeSH terms
LinkOut - more resources
Full Text Sources
Other Literature Sources