constructing parallel long-message signcryption scheme from trapdoor permutation
文献类型:期刊论文
作者 | ZhenYu Hu ; DongDai Lin ; Wu Wenling ; DengGuo Feng |
刊名 | Science in China Series F: Information Sciences
![]() |
出版日期 | 2007 |
卷号 | 50期号:1页码:82-98 |
关键词 | authenticated encryption signcryption trapdoor permutations parallel SECURITY |
通讯作者 | Hu, ZY (通讯作者), Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China |
收录类别 | SPRINGER,SCI |
WOS记录号 | WOS:000245639600007 |
公开日期 | 2010-08-19 |
附注 | A highly practical parallel signcryption scheme named PLSC from trapdoor permutations (TDPs for short) was built to perform long messages directly. The new scheme follows the idea "scramble all, and encrypt small", using some scrambling operation on message m along with the user's identities, and then passing, in parallel, small parts of the scrambling result through corresponding TDPs. This design enables the scheme to flexibly perform long messages of arbitrary length while avoid repeatedly invoking TDP operations such as the CBC mode, or verbosely black-box composing symmetric encryption and signcryption, resulting in noticeable practical savings in both message bandwidth and efficiency. Concretely, the signcryption scheme requires exactly one computation of the "receiver's TDP" (for "encryption") and one inverse computation of the "sender's TDP" (for "authentication"), which is of great practical significance in directly performing long messages, since the major bottleneck for many public encryption schemes is the excessive computational overhead of performing TDP operations. Cutting out the verbosely repeated padding, the newly proposed scheme is more efficient than a black-box hybrid scheme. Most importantly, the proposed scheme has been proven to be tightly semantically secure under adaptive chosen ciphertext attacks (IND-CCA2) and to provide integrity of ciphertext (INT-CTXT) as well as non-repudiation in the random oracle model. All of these security guarantees are provided in the full multi-user, insider-security setting. Moreover, though the scheme is designed to perform long messages, it may also be appropriate for settings where it is impractical to perform large block of messages (i.e. extremely low memory environments such as smart cards). |
源URL | [http://124.16.136.157/handle/311060/3370] ![]() |
专题 | 软件研究所_信息安全国家重点实验室_期刊论文 |
推荐引用方式 GB/T 7714 | ZhenYu Hu,DongDai Lin,Wu Wenling,et al. constructing parallel long-message signcryption scheme from trapdoor permutation[J]. Science in China Series F: Information Sciences,2007,50(1):82-98. |
APA | ZhenYu Hu,DongDai Lin,Wu Wenling,&DengGuo Feng.(2007).constructing parallel long-message signcryption scheme from trapdoor permutation.Science in China Series F: Information Sciences,50(1),82-98. |
MLA | ZhenYu Hu,et al."constructing parallel long-message signcryption scheme from trapdoor permutation".Science in China Series F: Information Sciences 50.1(2007):82-98. |
入库方式: OAI收割
来源:软件研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。