Abstract
An important advantage of signcryption schemes compared to one pass key exchange protocols is non-interactive non-repudiation (NINR). This attribute offers to the receiver of a signcrypted ciphertext the ability to generate a non-repudiation evidence, that can be verified by a third party without executing a costly multi-round protocol. We propose a computational Diffie–Hellman based insider secure signcryption scheme with non-interactive non-repudiation. Namely, we show that under the computational Diffie–Hellman assumption and the random oracle model, our scheme is tightly insider secure, provided the underlying encryption scheme is semantically secure. Compared to a large majority of the previously proposed signcryption schemes with NINR, our construction is more efficient and it does not use any specificity of the underlying group, such as pairings. The communication overhead of our construction, compared to Chevallier Mâmes’ signature scheme is one group element.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
If \(|\mathcal {G}|=2^{\lambda }\), the cost of \(\mathsf{{Exp}}(\mathcal {G})\) using the classical square-and-multiply algorithm is \(\approx 1.5\cdot \lambda \) operations in \(\mathcal {G}\). And if \(\mathcal {G}\) is such that the multiplication of two of its elements requires 14 multiplications in \(\mathbb {F}_{q}\) then the computational cost of an exponentiation is \(14\cdot 1.5\cdot \lambda \) multiplications in \(\mathbb {F}_{q}\).
- 2.
see also www.keylength.com
References
Abdalla, M., Bellare, M., Rogaway, P.: The oracle Diffie-Hellman assumptions and an analysis of DHIES. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 143–158. Springer, Heidelberg (2001)
Arriaga, A., Barbosa, M., Farshim, P.: On the joint security of signature and encryption schemes under randomness reuse: efficiency and security amplification. In: Bao, F., Samarati, P., Zhou, J. (eds.), Applied Cryptography and Network Security. ACNS 2012. LNCS, vol 7341. Springer, Berlin, Heidelberg (2012)
Badertscher, C., Banfi, F., Maurer, U.: A constructive perspective on signcryption security. In: Catalano, D., De Prisco, R. (eds.), Security and Cryptography for Networks. SCN 2018. LNCS, vol. 11035. Springer, Cham (2018)
Baek, J., Steinfeld, R., Zheng, Y.: Formal proofs for the security of signcryption. J. Cryptol. 20(2), 203–235 (2007)
Bao, F., Deng, R.H.: A signcryption scheme with signature directly verifiable by public key. In: Imai, H., Zheng, Y. (eds.), Public Key Cryptography. PKC 1998. LNCS, vol. 1431. Springer, Berlin, Heidelberg (1998)
Bellare, M., Neven, G.: Multi–signatures in the plain public–key model and a general forking lemma. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 390–399. ACM (2006)
Benhamouda, F., Couteau, G., Pointcheval, D., Wee, H.: Implicit zero-knowledge arguments and applications to the malicious setting. In: Gennaro, R., Robshaw, M. (eds.), Advances in Cryptology—CRYPTO 2015. CRYPTO 2015. LNCS, vol. 9216. Springer (2015)
Bjørstad, T.E., Dent, A.W.: Building better signcryption schemes with Tag-KEMs. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.), Public Key Cryptography—PKC 2006. PKC 2006. LNCS, vol. 3958. Springer, Berlin, Heidelberg (2006)
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. J. Cryptol. 17(4), 297–319 (2004)
Boneh, D., Shen, E., Waters, B.: Strongly unforgeable signatures based on computational Diffie–Hellman. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.), Public Key Cryptography—PKC 2006. PKC 2006. LNCS, vol. 3958. Springer, Berlin, Heidelberg (2006)
Cash, D., Kiltz, E., Shoup, V.: The twin Diffie-Hellman problem and applications. J. Cryptol. 22(4), 470–504 (2009)
Chevallier–Mames, B.: An efficient CDH–Based signature scheme with a tight security reduction. In: Shoup, V. (eds.), Advances in Cryptology—CRYPTO 2005. CRYPTO 2005. LNCS, vol. 3621. Springer, Berlin, Heidelberg (2005)
Chiba, D., Matsuda, T., Schuldt, J.C.N., Matsuura, K.: Efficient generic constructions of signcryption with insider security in the multi-user setting. In: Lopez, J., Tsudik, G. (eds.), Applied Cryptography and Network Security. ACNS 2011. LNCS, vol. 6715. Springer, Berlin, Heidelberg (2011)
Fan, J., Zheng, Y., Tang, X.: Signcryption with non–interactive non–repudiation without random oracles. In: Transactions on Computational Science X, pp. 202–230. Springer, Berlin, Heidelberg (2010)
Goh, E.J., Jarecki, S.: A signature scheme as secure as the Diffie–Hellman problem. In: Biham, E. (eds.), Advances in Cryptology—EUROCRYPT’ 03. EUROCRYPT 2003. LNCS, vol. 2656. Springer, Berlin, Heidelberg (2003)
Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer (2004)
Katz, J., Wang, N.: Efficiency improvements for signature schemes with tight security reductions. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 155–164. ACM (2003)
Lenstra, A.K.: Key lengths. Handbook of Information Security, vol. 2, pp. 617–635. Wiley (2005)
Malone–Lee, J.: Signcryption with non–interactive non–repudiation. Designs, Codes and Cryptography, vol. 37, no. 1, pp. 81–109. Springer (2005)
Matsuda, T., Matsuura, K., Schuldt, J.C.N.: Efficient constructions of signcryption schemes and signcryption composability. In: Roy, B., Sendrier, N. (eds.), Progress in Cryptology—INDOCRYPT 2009. INDOCRYPT 2009. LNCS, vol. 5922. Springer, Berlin, Heidelberg (2009)
Ngarenon, T., Sarr, A.P.: A Computational Diffie–Hellman based Insider Secure Signcryption with Non Interactive Non Repudiation (full version) (2022). https://hal.archives-ouvertes.fr/hal-03628351/
Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: Maurer, U. (eds.), Advances in Cryptology—EUROCRYPT’96. EUROCRYPT 1996. LNCS, vol. 1070. Springer, Berlin, Heidelberg (1996)
Sarr A.P., Seye P.B., Ngarenon T.: A Practical and Insider Secure Signcryption with Non-interactive Non-repudiation. In: Carlet C., Guilley S., Nitaj A., Souidi E. (eds.), Codes, Cryptology and Information Security. C2SI 2019. LNCS, vol. 11445. Springer, Cham (2019)
Zheng, Y.: Digital signcryption or how to achieve cost(signature & encryption) \(\ll \) cost(signature) + cost(encryption). In: Kaliski, B.S. (eds.), Advances in Cryptology—CRYPTO ’97. CRYPTO 1997. LNCS, vol. 1294. Springer, Berlin, Heidelberg (1997)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Togde, N., Sarr, A.P. (2022). A Computational Diffie–Hellman-Based Insider Secure Signcryption with Non-interactive Non-repudiation. In: Rushi Kumar, B., Ponnusamy, S., Giri, D., Thuraisingham, B., Clifton, C.W., Carminati, B. (eds) Mathematics and Computing. ICMC 2022. Springer Proceedings in Mathematics & Statistics, vol 415. Springer, Singapore. https://doi.org/10.1007/978-981-19-9307-7_8
Download citation
DOI: https://doi.org/10.1007/978-981-19-9307-7_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-9306-0
Online ISBN: 978-981-19-9307-7
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)