Developing an Effective and Compressed Hybrid Signcryption Technique Utilizing Huffman Text Coding Procedure


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


The functions of digital signature and public key encryption are simultaneously fulfilled by signcryption, which is a cryptographic primitive. To securely communicate very large messages, the cryptographic primitive called signcryption efficiently implements the same and while most of the public key based systems are suitable for small messages, hybrid encryption (KEM-DEM) provides a competent and practical way. In this paper, we develop a compressed hybrid signcryption technique. The hybrid signcryption is based on the KEM and DEM technique. The KEM algorithm utilizes the KDF technique to encapsulate the symmetric key. The DEM algorithm utilizes the AES algorithm to encrypt the original message. Finally the signcrypted data is compressed with the help of Huffman text coding procedure. Here, for the security purpose, we introduce the three games and we proved the attackers fail to find the security attributes of our proposed signcryption algorithm.
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


KEM (Key Encapsulation Mechanism); DEM (Data Encapsulation Mechanism); KDF (Key Derivation Function); Huffman Encoding Algorithm; Signcryption; Hybrid Signcryption

Full Text:

PDF


References


Masayuki Abe , Rosario Gennaro and Kaoru Kurosawa, “Tag-KEM/DEM: a New Framework for Hybrid Encryption and a New Analysis of Kurosawa-Desmedt KEM” , in proceedings of Eurocrypt, pp. 128- 146, 2005.

Adi Shamir, “Identity-based cryptosystems and signature schemes”, In Advances in Cryptology, CRYPTO - 1984, volume 196 of Lecture Notes in Computer Science, pages 47–53. Springer, 1984.

S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan, "Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction Without Pairing", journal of Information Security and Cryptology, Vol. 6151, pp 75-92, 2011.

Joseph K. Liu, Joonsang Baek, and Jianying Zhou, "Online/Offine Identity-Based Signcryption Revisited", journal of Information Security and Cryptology, Vol. 6584, pp 36-51, 2011.

Sattam S. Al-Riyami and Kenneth G. Paterson, “Certificateless public key cryptography. In Advances in Cryptology ASIACRYPT”, volume 2894 of Lecture Notes in Computer Science, pages. 452–473, 2003.

Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan, "Identity Based Public Verifiable Signcryption Scheme", Proceedings of the 4th international conference on Provable security, PP.244-260, 2010.

Mohsen Toorani and Ali A. Beheshti, "An Elliptic Curve-based Signcryption Scheme with Forward Secrecy" journal of applied science, vol. 9, no. 6, p. 1025-2035, 2009.

Mohsen Toorani and Ali A. Beheshti,"Cryptanalysis of an Elliptic Curve-based Signcryption Scheme", internationall journal of network security, vol. 10, no. 1, pp. 51-56, 2010.

Yuliang Zheng, “Digital signcryption or how to achieve cost(signature & encryption) < < cost(signature) + cost(encryption)”, In Advances in Cryptology, CRYPTO - 1997, volume 1294 of Lecture Notes in Computer Science, pages 165–179, 1997.

Joonsang Baek, Reihaneh Safavi-Naini, and Willy Susilo. Certificateless public key encryption without pairing. In Information Security - ISC 2005, volume 3650 of Lecture Notes in Computer Science, pages 134–148. Springer, 2005.

Zhaohui Cheng and Richard Comley. “Efficient certificateless public key encryption. In proceedings of eurocrypt 91, LNCS 547, 2005.

Yinxia Sun, Futai Zhang, and Joonsang Baek. Strongly secure certificateless public key encryption without pairing. In Cryptology and Network Security - CANS 2007, volume 4856 of Lecture Notes in Computer Science, pages 194–208, 2007.

Joseph K Liu, Man Ho Au, and Willy Susilo, “Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model: extended abstract”, In ASIACCS 2007, Proceedings of the 2nd ACM symposium on Information, Computer and Communications Security, pages 273–283, 2007.

Jong Hwan Park, Kyu Young Choi, Jung Yeon Hwang, and Dong Hoon Lee. Certificateless public key encryption in the selective-id security model (without random oracles). In Pairing-Based Cryptography - Pairing 2007, volume 4575 of Lecture Notes in Computer Science, pages 60–82. Springer, 2007.

Alexander W. Dent, “A survey of certificateless encryption schemes and security models”, International Journal of Information Security, Volume-7, no. 5, pp: 349–377, 2008.

Wenjian Xie, Zhang Zhang, "Efficient and Provably Secure Certificateless Signcryption from Bilinear Maps", proceedings of International Conference on Wireless Communications, Networking and Information Security, pp. 558- 562, 2010.

Hui fang Ji, Wenbao Han, Long Zhao,"Certificateless Generalized Signcryption", international conference on medical physics and biomedical engineering, vol. 33, pp. 962-967, 2012.

Prashant Kushwah and Sunder Lal, "Efficient Generalized Signcryption Schemes",ACR Cryptology ePrint Archive 2010 pages. 346, 2010.

Gang Yu, Xiaoxiao Ma, Yong Shen, Wenbao Han, "Provable Secure Identity Based Generalized Signcryption Scheme", Journal of Theoretical Computer Science, vol. 411, no, 40-42, pp. 3614-3624, 2010.

Pengcheng LI, Mingxing HE, Xiao LI, Wengang LIU, "Efficient and Provably Secure Certificateless Signcryption from Bilinear Pairings", Journal of Computational Information Systems vol. 6, no. 11, pp.3643-3650, 2010.

Alexander W. Dent, Marc Fischlin, Mark Manulis, Dominique Schröder, Martijn Stam, "Confidential Signatures and Deterministic Signcryption", Proceedings of 13th International Conference on Practice and Theory in Public Key Cryptography, vol. 6056, pp. 462-479, 2010.

Nadia M. G. Al-Saidi, “An efficient signcryption method using fractal image coding scheme”, International Journal of Applied Mathematics and Informatics, vol.6, no. 4, pp.189-197 , 2012.

Fagen Li, Masaaki Shirase, Tsuyoshi Takagi, "Certificateless Hybrid Signcryption", Information Security Practice and Experience Lecture Notes in Computer Science, Vol. 5451, pp 112-123, 2009.

R. Cramer and V. Shoup, “Design and analysis of practical public key encryption schemes secure against adaptive chosen ciphertext attack,” SIAM Journal on Computing, vol. 33, no. 1, pp.167-226, 2004.

Victor Shoup, "Using Hash Functions as a Hedge against Chosen Ciphertext Attack" Advances in Cryptology — EUROCRYPT 2000 Lecture Notes in Computer Science, Vol.1807, pp 275-288, 2000.

Alexander W. Dent, "Hybrid Signcryption Schemes with outsider Security", Information Security Lecture Notes in Computer Science, Vol. 3650, pp. 203-217, 2005.

Alexander W. Dent, "Hybrid Signcryption Schemes with Insider Security", Information Security and Privacy Lecture Notes in Computer Science, Vol.3574, 2005, pp. 253-266, 2005.

Y. Dodis, R. Gennaro, J. Håstad, H. Krawczyk, and T. Rabin, Randomness Extraction and Key derivation Using the CBC, Cascade, and HMAC Modes, Crypto’04, LNCS 3152, pp. 494-510. Springer Verlag, 2004.

M. S. Rababaa, S. J. Aboud, M. A. Al-Fayoumi, "An Efficient Designated Receiver Signature Scheme" International Review on Computers and Software (IRECOS), Vol.2, no.4, pp. 366 - 370, 2007.

Sun, H., An efficient provably secure certificateless signcryption without random oracles, (2013) International Review on Computers and Software (IRECOS), 8 (2), pp. 599-604.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize