Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2025 Mar 12;25(6):1773.
doi: 10.3390/s25061773.

A Decentralized Signcryption Scheme Based on CFL

Affiliations

A Decentralized Signcryption Scheme Based on CFL

Leyi Shi et al. Sensors (Basel). .

Abstract

The rapid advancement of quantum computing technology poses a significant threat to conventional public key cryptographic infrastructure. The SM2 (state key cryptography algorithm no. 2) elliptic curve public key cryptographic algorithm, which adopts elliptic curve cryptography, has demonstrated strong resistance to quantum attacks. However, existing signcryption schemes remain vulnerable due to their reliance on a single certification authority (CA) managing all keys. The cryptography fundamental logics (CFL) authentication process eliminates the need for third-party involvement, achieving decentralized authentication and reducing the burden on certificate generation centers. Therefore, a decentralized signcryption scheme based on CFL was proposed using the SM2 national cryptographic algorithm. Unlike traditional signcryption schemes, this approach does not depend on the certification authority's private key during the public-private key generation process. This innovation helps avoid risks associated with certification authority private key leakage and ensures decentralized characteristics. The proposed scheme was rigorously verified under the random oracle model (ROM) and based on the complexity assumption of the elliptic curve Diffie-Hellman (ECDH) problem. The theoretical analysis and experimental results demonstrate that compared to traditional methods, the proposed scheme exhibits higher efficiency in communication and computation. Specifically, the proposed scheme reduces computational overheads by approximately 30% and communication overheads by approximately 20% in practical working environments. These quantitative improvements highlight the scheme's promising application prospects and practical value.

Keywords: CFL; SM2; provable security; random oracle model; signcryption.

PubMed Disclaimer

Conflict of interest statement

Author Leyi Shi was employed by the company Qingdao Guochuang Intelligent Appliance Research Institute Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Figures

Figure 1
Figure 1
CFL-based signcryption algorithm.
Figure 2
Figure 2
Time consumption comparison.
Figure 3
Figure 3
Remote access time consumption comparison.

Similar articles

References

    1. Zheng Y. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption); Proceedings of the Annual International Cryptology Conference; Santa Barbara, CA, USA. 17–21 August 1997.
    1. Yu H.F., Qiao Y.F., Meng R. Quantum-resistant attribute-based threshold ring signcryption scheme for blockchain finance. Inf. Netw. Secur. 2023;23:44–52.
    1. Ke-Zhen Z., Jing-Qiang L., Wei W., Yong L., Guang-Zheng L., Zhen-Ya L. Research on Two-Party SM2 Threshold Signature Schemes with a Blind Cooperative Server. J. Cryptologic Res. 2024;11:945–962. doi: 10.13868/j.cnki.jcr.000718. - DOI
    1. Wang X., Qian H. Attacks against Two Identity-Based Signcryption Schemes; Proceedings of the Second International Conference on Networks Security, Wireless Communications and Trusted Computing; Wuhan, China. 24–25 April 2010.
    1. Xie Z., Chen Y., Ali I., Pan C., Li F., He W. Efficient and Secure Certificateless Signcryption Without Pairing for Edge Computing-Based Internet of Vehicles. IEEE Trans. Veh. Technol. 2023;72:5642–5653. doi: 10.1109/TVT.2022.3230442. - DOI

LinkOut - more resources