..............................
..............................
..............................
MPKC-based Threshold Proxy Signcryption Scheme
The threshold proxy signcryption can implement signature and encryption simultaneously in one logical step, and
can be used to realize the decentralized protection of the group signature key, so it is an efficient technology for network
security. Currently, most of the existing threshold proxy signcryption schemes are designed based on the traditional public key
cryptosystems, and their security mainly depends on the difficulty of the large integer decomposition and the discrete
logarithm. However, the traditional public key cryptosystems cannot resist the quantum computer attack, which makes the
existing threshold proxy signcryption schemes based on traditional public key cryptosystems insecure against quantum attacks.
Motivated by these concerns, we proposed a threshold proxy signcryption scheme based on Multivariate Public Key
Cryptosystem (MPKC) which is one of the quantum attack-resistent public key algorithms. Under the premise of satisfying the
threshold signcryption requirements of the threshold proxy, our scheme can not only realize the flexible participation of the
proxy signcrypters but also resist the quantum computing attack. Finally, based on the assumption of Multivariate Quadratic
(MQ) problem and Isomorphism Polynomial (IP) problem, the proof of the confidentiality and the unforgeability of the
proposed scheme under the random oracle model is given.
[1] Chan W. and Wei V., “A Threshold Proxy Signcryption,” in Proceedings of International Conference on Security and Management, Las Vegas, pp. 249-254, 2002.
[2] Gamage C. and Leiwo J., “An Efficient Scheme for Secure Message Transmission using Proxy- signcryption,” in Proceeding of the 20nd Australasian Computer Science Conference, Australia, pp.18-21, 1998.
[3] Gao W., Hu Y., Wang B., and Xie J., “Improved Identification Protocol in the Quantum Random Oracle Model” The International Arab Journal of Information Technology, vol. 14, no. 3, pp. 339- 345, 2017.
[4] Lai J., Mu Y., and Guo F., “Efficient Identity- based Online/offline Encryption and Signcryption with Short Ciphertext,” International Journal of Information Security, vol. 16, no. 3, pp. 299-311, 2017.
[5] Li F., Xin X., and Hu Y., “ID-based Threshold Proxy Signcryption Scheme from Bilinear Pairings,” International Journal of Security and Networks, vol. 3, no. 3, pp. 206-215, 2008.
[6] Li H. and Pang L., “Cryptanalysis of Wang et al.’s Improved Anonymous Multi-receiver Identity-based Encryption Scheme,” IET Information Security, vol. 8, no. 1, pp. 8-11, 2014.
[7] Li H., Chen X., Pang L., and Shi W., “Quantum Attack-resistent Certificateless Multi-receiver Signcryption Scheme,” PloS One, vol. 8, no. 6, 2013.
[8] Lin H., Wu T., Huang S., and Yeh Y., “Efficient Proxy Signcryption Scheme with Provable CCA and CMA Security,” Computers and Mathematics with Applications, vol. 60, no. 7, pp. 1850-1858, 2010.
[9] Lu G., Xue L., Nie X., and Qin Z., “Cryptanalysis of Novel Extended Multivariate Public Key Cryptosystem with Invertible Cycle,” International Journal of Network Security, vol. 20, no. 3, pp. 509-514, 2018.
[10] Pan C., Li S., Zhu Q., Wang C., and Zhang M., “Notes on Proxy Signcryption and Multi-proxy Signature Schemes,” International Journal of Network Security, vol. 17, no. 1, pp. 29-33, 2015.
[11] Pang L., Hu Y., Liu Y., and Xu K., “Efficient and Secure Certificateless Signature Scheme in the Standard Model,” International Journal of Communication Systems, vol. 30, no. 5, pp. 1-14, 2017.
[12] Shor P., “Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer,” SIAM Review, vol. 41, no. 2, pp. 303-332, 1999.
[13] Swapna G., Gopal P., Gowri T., and Reddy V., “An Efficient ID-based Proxy Signcryption Scheme,” International Journal of Information and Network Security, vol. 1, no. 3, pp. 200-206, 2012.
[14] Tanwar S. and Kumar A., “Extended Identity based Multi-signcryption Scheme with Public Verifiability,” Journal of Information and Optimization Sciences, vol. 39, no. 2, pp. 503- 517, 2018.
[15] Wang M. and Liu Z., “Identity based Threshold Proxy Signcryption Scheme,” in Proceedings of the 5th International Conference on Computer and Information Technology, Shanghai, pp. 695- 699, 2005.
[16] Wang Q., Cao Z., and Wang S., “Formalized Security Model of Multi-proxy Signature Schemes,” in Proceedings of the 5th International 206 The International Arab Journal of Information Technology, Vol. 17, No. 2, March 2020 Conference on Computer and Information Technology, Shanghai, pp. 668-672, 2005.
[17] Xue Q., Li F., Ge G., Shen J., and Cao Z., “Position-based Proxy Signcryption,” in Proceedings of IEEE/CIC International Conference on Communications in China, Shenzhen, pp. 1-6, 2015.
[18] Yang J. and Yu Z., “New Identity-based Threshold Proxy Signcryption Scheme,” Journal of Computer Applications, vol. 30, no. 1, pp. 121- 124, 2010.
[19] Yeh J., “The Insecurity of Two Proxy Signcryption Schemes: Proxy Credential Forgery Attack and How to Prevent It,” The Journal of Supercomputing, vol. 70, no. 3, pp. 1100-1119, 2014.
[20] Zheng Y., “Digital Signcryption or How to Achieve Cost (Signature and Encryption) ≪ Cost (Signature)+Cost (Encryption),” in Proceeding of Annual International Cryptology Conference, Santa Barbara, pp. 165-179, 1997.
[21] Zhou M. and Yu Z., “New Double-threshold Proxy Signcryption Scheme from Bilinear Pairings,” Computer Engineering and Applications, vol. 47, no. 32, pp. 98-100, 2011. Li Huixian is an Associate Professor with School of Computer Science and Engineering, Northwestern Polytechnical University, Xi’an, China Her main research interests include information security, cryptography and secure protocols. Gao Jin is currently pursuing the Master degree in School of Computer Science and Engineering, Northwestern Polytechnical University, Xi’an, China. His research interest focuses on attribute- based encryption. Wang Lingyun is currently pursuing the Master degree in School of Computer Science and Engineering, Northwestern Polytechnical University, Xi’an, China His research interest focuses on multivariate public key cryptosystem Pang Liaojun is a full professor with State Key Laboratory of Integrated Services Networks of Xidian University, and at the same time he was a visiting scholar at the Department of Computer Science of Wayne State University of USA His research interests include Internet security, cryptography, secure mobile agent system and e-commerce security technology. He became a Member (M) of IEEE in 2009.