Heterogeneous signcryption with key privacy

A signcryption scheme allows a sender to produce a ciphertext for a receiver so that both confidentiality and non-repudiation can be ensured. It is built to be more efficient and secure, for example, supporting insider security, when compared with the conventional sign-then-encrypt approach. In this...

Full description

Saved in:
Bibliographic Details
Main Authors: HUANG, Qiong, WONG, Duncan S., YANG, Guomin
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2011
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7442
https://ink.library.smu.edu.sg/context/sis_research/article/8445/viewcontent/10.1.1.843.2918.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-8445
record_format dspace
spelling sg-smu-ink.sis_research-84452022-10-20T07:45:50Z Heterogeneous signcryption with key privacy HUANG, Qiong WONG, Duncan S. YANG, Guomin A signcryption scheme allows a sender to produce a ciphertext for a receiver so that both confidentiality and non-repudiation can be ensured. It is built to be more efficient and secure, for example, supporting insider security, when compared with the conventional sign-then-encrypt approach. In this paper, we propose a new notion called heterogeneous signcryption in which the sender has an identity-based secret key while the receiver is holding a certificate-based public key pair. Heterogeneous signcryption is suitable for practical scenarios where an identity-based user, who does not have a personal certificate or a public key, wants to communicate securely with a server which has a certificate with its public key. We propose two constructions and show their security under the model we define in the random oracle model. The model we define captures the insider security for both confidentiality and unforgeability. Both of the schemes also support public verifiability and key privacy, that is, an adversary cannot find out who the sender and receiver are from a ciphertext in the insider security model. The second scheme is the most efficient one computationally among all key-privacy-preserving signcryption schemes even when compared with schemes in an identity-based cryptographic setting or certificate-based public key setting. 2011-04-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7442 info:doi/10.1093/comjnl/bxq095 https://ink.library.smu.edu.sg/context/sis_research/article/8445/viewcontent/10.1.1.843.2918.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University key privacy ciphertext anonymity identity-based cryptography Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic key privacy
ciphertext anonymity
identity-based cryptography
Information Security
spellingShingle key privacy
ciphertext anonymity
identity-based cryptography
Information Security
HUANG, Qiong
WONG, Duncan S.
YANG, Guomin
Heterogeneous signcryption with key privacy
description A signcryption scheme allows a sender to produce a ciphertext for a receiver so that both confidentiality and non-repudiation can be ensured. It is built to be more efficient and secure, for example, supporting insider security, when compared with the conventional sign-then-encrypt approach. In this paper, we propose a new notion called heterogeneous signcryption in which the sender has an identity-based secret key while the receiver is holding a certificate-based public key pair. Heterogeneous signcryption is suitable for practical scenarios where an identity-based user, who does not have a personal certificate or a public key, wants to communicate securely with a server which has a certificate with its public key. We propose two constructions and show their security under the model we define in the random oracle model. The model we define captures the insider security for both confidentiality and unforgeability. Both of the schemes also support public verifiability and key privacy, that is, an adversary cannot find out who the sender and receiver are from a ciphertext in the insider security model. The second scheme is the most efficient one computationally among all key-privacy-preserving signcryption schemes even when compared with schemes in an identity-based cryptographic setting or certificate-based public key setting.
format text
author HUANG, Qiong
WONG, Duncan S.
YANG, Guomin
author_facet HUANG, Qiong
WONG, Duncan S.
YANG, Guomin
author_sort HUANG, Qiong
title Heterogeneous signcryption with key privacy
title_short Heterogeneous signcryption with key privacy
title_full Heterogeneous signcryption with key privacy
title_fullStr Heterogeneous signcryption with key privacy
title_full_unstemmed Heterogeneous signcryption with key privacy
title_sort heterogeneous signcryption with key privacy
publisher Institutional Knowledge at Singapore Management University
publishDate 2011
url https://ink.library.smu.edu.sg/sis_research/7442
https://ink.library.smu.edu.sg/context/sis_research/article/8445/viewcontent/10.1.1.843.2918.pdf
_version_ 1770576339917602816