pCLSC-TKEM: a Pairing-free Certificateless Signcryption-tag Key Encapsulation Mechanism for a Privacy-Preserving IoT

نویسندگان

  • Seung-Hyun Seo
  • Jongho Won
  • Elisa Bertino
چکیده

Certificateless Signcryption Tag Key Encapsulation Mechanism (CLSC-TKEM) is an effective method for simultaneously providing key encapsulation and a digital signature on the tag. It has applications in several security services such as communication confidentiality, integrity, authentication, and non-repudiation. Moreover, because CLSC-TKEM is based on certificateless public key cryptography (CL-PKC), it has the advantage of not requiring public key certificates. In addition it does not suffer from the key escrow problem which is instead a major drawback of identity-based public key cryptography (ID-PKC). Unfortunately, current constructions of CLSC-TKEM rely on the use of bilinear pairing-based operations that are computationally very expensive for small IoT devices. In this paper, we present a new construction of CLSC-TKEM that does not require bilinear pairing operations. We refer to our new construction on pairing-free Certificateless Signcryption Tag Key Encapsulation Mechanism (pCLSC-TKEM). We also provide a simple construction for pairingfree certificateless hybrid signcryption by combining pCLSC-TKEM with a data encapsulation mechanism (DEM). We provide a security model for pCLSC-TKEM. Then, we prove that our pCLSC-TKEM is secure against both an adaptively chosen ciphertext attack and existential forgery in the random oracle model. We have implemented our pCLSC-TKEM construction and previous pairing-based CLSC-TKEM constructions in order to compare their performance. Our experimental results demonstrate that pCLSC-TKEM is much more efficient that previous pairing-based CLCS-TKEM constructions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Certificateless Signcryption Tag-KEMs for Resource-constrained Devices

Efficient certificateless one-pass session key establishment protocols can be constructed from key encapsulation mechanisms (KEMs) by making use of tags and signcryption schemes. The resulting primitives are referred to as Certificateless Signcryption Tag Key Encapsulation Mechanisms (CLSC-TKEMs). In this paper we propose two novel CLSC-TKEM protocols, the first, named LSW-CLSC-TKEM, makes use ...

متن کامل

Keccak MD Hash Algorithm Based Tag Kem for Certificateless Hybrid Signcryption

This paper presents a novel idea to implement Key Encapsulation Mechanism (KEM) in a CL hybrid encryption setting to provide security to the key itself, before the actual data encryption of long message. Tag-KEM (Key Encapsulation Mechanism with a tag) is an authenticated method for generic construction of hybrid encryption. TagKEM (TKEM) allows the sender to encapsulate a symmetric key along w...

متن کامل

Generic Certificateless Key Encapsulation Mechanism

We propose the first generic construction of certificateless key encapsulation mechanism (CL-KEM) in the standard model, which is also secure against malicious-but-passive KGC attacks. It is based on an ID-based KEM, a public key encryption and a message authentication code. The high efficiency of our construction is due to the efficient implementations of these underlying building blocks, and ...

متن کامل

Certificateless Hybrid Signcryption Scheme with Known Session-Specific Temporary Information Security

The hybrid signcryption scheme based on certificateless public key cryptography avoids the complexity of certificate management existing in the traditional public key cryptography and the inherent key escrow problem existing in identity-based public key cryptography. The certificateless hybrid signcryption scheme combined with certificateless signcryption key encapsulation mechanism and data en...

متن کامل

Tag - KEM for Self - certified Ring Signcryption ?

Signcryption tag-KEM (key encapsulation mechanism with tag) allows the sender to encapsulate a symmetric key along with a tag so that the receiver can authenticate the sender, the key and the tag. In this paper, we introduce the notion of signcryption tag-KEM to the self-certified setting and ring signcryption, and construct a tag-KEM for self-certified ring signcryption, which only takes one p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Transactions on Data Privacy

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2016