A Publicly Verifiable Leveled Fully Homomorphic Signcryption Scheme

被引:0
|
作者
Bian, Zhaoxuan [1 ,2 ]
Wang, Fuqun [1 ,2 ]
Zhang, Renjun [1 ,2 ]
Lian, Bin [3 ]
Han, Lidong [2 ]
Chen, Kefei [1 ,2 ]
机构
[1] Hangzhou Normal Univ, Sch Math, Hangzhou 31121, Peoples R China
[2] Hangzhou Normal Univ, Key Lab Cryptog Zhejiang Prov, Hangzhou 31121, Peoples R China
[3] NingboTech Univ, Ningbo 315199, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Public verifiability - Publicly verifiable - Signcryption schemes - Standard assumptions - Waste of resources;
D O I
10.1049/2023/1377042
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the deepening of research, how to construct a fully homomorphic signcryption scheme based on standard assumptions is a problem that we need to solve. For this question, recently, Jin et al. proposed a leveled fully homomorphic signcryption scheme from standard lattices. However, when verifying, it is supposed to unsigncrypt first as they utilize sign-then-encrypt method. This leads to users being unable to verify the authenticity of the data first, which resulting in the waste of resources. This raises another question of how to construct an fully homomorphic signcryption (FHSC) scheme with public verifiability. To solve this problem, we propose a leveled fully homomorphic signcryption scheme that can be publicly verified and show its completeness, IND-CPA security, and strong unforgeability.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] A publicly verifiable authenticated encryption scheme with message linkages
    Peng, YQ
    Xie, SY
    Chen, YF
    Deng, R
    Peng, LX
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1271 - 1276
  • [32] A publicly verifiable anonymous IBE scheme in the standard model
    Li S.-D.
    Yang K.-W.
    Gong L.-M.
    Mao Q.
    Liu X.
    Yang, Kun-Wei (yangkunwei@163.com), 1600, Chinese Institute of Electronics (44): : 673 - 678
  • [34] Publicly Verifiable Distributed Proxy Blind Signature Scheme
    MA Chuangui
    WuhanUniversityJournalofNaturalSciences, 2007, (01) : 155 - 158
  • [35] Publicly verifiable database scheme with efficient keyword search
    Miao, Meixia
    Wang, Jianfeng
    Wen, Sheng
    Ma, Jianfeng
    INFORMATION SCIENCES, 2019, 475 : 18 - 28
  • [36] Leveled Multi-Hop Multi-Identity Fully Homomorphic Encryption
    Liu, Wen
    Wang, Fuqun
    Jin, Xiaodan
    Chen, Kefei
    Shen, Zhonghua
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [37] Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes
    Shen, Tongchen
    Wang, Fuqun
    Chen, Kefei
    Wang, Kunpeng
    Li, Bao
    IEEE ACCESS, 2019, 7 : 79299 - 79310
  • [38] Efficient identity-based leveled fully homomorphic encryption from RLWE
    Sun, Xiaoqiang
    Yu, Jianping
    Wang, Ting
    Sun, Zhiwei
    Zhang, Peng
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5155 - 5165
  • [39] An efficient fully homomorphic encryption scheme
    El-Yahyaoui, Ahmed
    El Kettani, Mohamed Dafir Ech-Cherif
    International Journal of Network Security, 2019, 21 (01) : 91 - 99
  • [40] Identity-Based Leveled Fully Homomorphic Encryption over Ideal Lattices
    Wang Weili
    Hu Bin
    Zhao Xiufeng
    2017 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA ANALYSIS (ICBDA), 2017, : 382 - 386