Javascript must be enabled to continue!
MPKC-based Threshold Proxy Signcryption Scheme
View through CrossRef
The threshold proxy signcryption can implement signature and encryption simultaneously in one logical step, and can be used to realize the decentralized protection of the group signature key, so it is an efficient technology for network security. Currently, most of the existing threshold proxy signcryption schemes are designed based on the traditional public key cryptosystems, and their security mainly depends on the difficulty of the large integer decomposition and the discrete logarithm. However, the traditional public key cryptosystems cannot resist the quantum computer attack, which makes the existing threshold proxy signcryption schemes based on traditional public key cryptosystems insecure against quantum attacks. Motivated by these concerns, we proposed a threshold proxy signcryption scheme based on Multivariate Public Key Cryptosystem (MPKC) which is one of the quantum attack-resistent public key algorithms. Under the premise of satisfying the threshold signcryption requirements of the threshold proxy, our scheme can not only realize the flexible participation of the proxy signcrypters but also resist the quantum computing attack. Finally, based on the assumption of Multivariate Quadratic (MQ) problem and Isomorphism Polynomial (IP) problem, the proof of the confidentiality and the unforgeability of the proposed scheme under the random oracle model is given.
Title: MPKC-based Threshold Proxy Signcryption Scheme
Description:
The threshold proxy signcryption can implement signature and encryption simultaneously in one logical step, and can be used to realize the decentralized protection of the group signature key, so it is an efficient technology for network security.
Currently, most of the existing threshold proxy signcryption schemes are designed based on the traditional public key cryptosystems, and their security mainly depends on the difficulty of the large integer decomposition and the discrete logarithm.
However, the traditional public key cryptosystems cannot resist the quantum computer attack, which makes the existing threshold proxy signcryption schemes based on traditional public key cryptosystems insecure against quantum attacks.
Motivated by these concerns, we proposed a threshold proxy signcryption scheme based on Multivariate Public Key Cryptosystem (MPKC) which is one of the quantum attack-resistent public key algorithms.
Under the premise of satisfying the threshold signcryption requirements of the threshold proxy, our scheme can not only realize the flexible participation of the proxy signcrypters but also resist the quantum computing attack.
Finally, based on the assumption of Multivariate Quadratic (MQ) problem and Isomorphism Polynomial (IP) problem, the proof of the confidentiality and the unforgeability of the proposed scheme under the random oracle model is given.
Related Results
Hybrid lightweight Signcryption scheme for IoT
Hybrid lightweight Signcryption scheme for IoT
AbstractThe information transmitted in IoT is susceptible to affect the user’s privacy, and hence the information ought to be transmitted securely. The conventional method to assur...
Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains
Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains
Although encryption and signatures have been two fundamental technologies for cryptosystems, they still receive considerable attention in academia due to the focus on reducing comp...
OTOMATISASI ACL SQUID PROXY SERVER BERBASIS WEB
OTOMATISASI ACL SQUID PROXY SERVER BERBASIS WEB
Squid is the most widely used program by the network administrator as a program for squid proxy server is open source ( free ) that can be modified according to our wishes. ...
A New Certificateless Signcryption Scheme for Securing Internet of Vehicles
A New Certificateless Signcryption Scheme for Securing Internet of Vehicles
Abstract
The application of digital signature technology on the Internet of Vehicles (IoV) is affected by its network and communication environment, which requires low tran...
The Fractures Optimization Method with the Threshold Pressure of Multistage Fracturing in Tight Oil Reservoir
The Fractures Optimization Method with the Threshold Pressure of Multistage Fracturing in Tight Oil Reservoir
Abstract
As permeability of tight oil reservoir is generally less than 0.1md, diameters of pore throats are primarily at the micrometer- and nanometer-scale. Differe...
Nociceptive disorders in patients with microvascular angina pectoris and patients with silent myocardial ischemia
Nociceptive disorders in patients with microvascular angina pectoris and patients with silent myocardial ischemia
Abstract
Funding Acknowledgements
Type of funding sources: Public Institution(s). Main funding source(s): North-western State Me...
Assessing the Equity and Redistributive Effects of Taxation Reforms in Nigeria
Assessing the Equity and Redistributive Effects of Taxation Reforms in Nigeria
Achieving the Sustainable Development Goals (SDGs) of poverty and inequality reduction through redistribution have indeed become critical concerns in many low- and middle-income co...
Depth and seasonal biases in organic temperature proxies: a modelling study
Depth and seasonal biases in organic temperature proxies: a modelling study
<p>For more than a decade TEX<sub>86</sub> and U<sup>K&#8217;</sup><sub>37</sub&a...

