..............................
            ..............................
            ..............................
            
MPKC-based Threshold Proxy Signcryption Scheme
        
        The  threshold  proxy  signcryption  can  implement  signature  and  encryption  simultaneously  in one logical  step, and 
can  be  used  to realize  the decentralized  protection  of  the  group  signature  key,  so  it  is  an  efficient  technology  for  network 
security. Currently, most of the existing threshold proxy signcryption schemes are designed based on the traditional public key 
cryptosystems,  and their security  mainly  depends  on  the  difficulty  of the large  integer  decomposition  and  the  discrete 
logarithm. However, the  traditional  public  key  cryptosystems cannot  resist  the  quantum  computer  attack,  which  makes  the 
existing threshold proxy signcryption schemes based on traditional public key cryptosystems insecure against quantum attacks. 
Motivated  by  these  concerns, we proposed a threshold proxy  signcryption  scheme  based  on Multivariate  Public  Key 
Cryptosystem (MPKC) which is one of the quantum attack-resistent public key algorithms. Under the premise of satisfying the 
threshold signcryption  requirements  of  the  threshold  proxy,  our  scheme  can  not  only  realize  the  flexible  participation  of  the 
proxy  signcrypters  but  also  resist  the  quantum  computing  attack.  Finally, based on the  assumption  of  Multivariate  Quadratic 
(MQ) problem  and Isomorphism  Polynomial (IP) problem,  the  proof  of  the  confidentiality  and  the  unforgeability  of  the 
proposed scheme under the random oracle model is given.    
            [1] Chan W. and Wei V., “A Threshold Proxy Signcryption,” in Proceedings of International Conference on Security and Management, Las Vegas, pp. 249-254, 2002.
[2] Gamage C. and Leiwo J., “An Efficient Scheme for Secure Message Transmission using Proxy- signcryption,” in Proceeding of the 20nd Australasian Computer Science Conference, Australia, pp.18-21, 1998.
[3] Gao W., Hu Y., Wang B., and Xie J., “Improved Identification Protocol in the Quantum Random Oracle Model” The International Arab Journal of Information Technology, vol. 14, no. 3, pp. 339- 345, 2017.
[4] Lai J., Mu Y., and Guo F., “Efficient Identity- based Online/offline Encryption and Signcryption with Short Ciphertext,” International Journal of Information Security, vol. 16, no. 3, pp. 299-311, 2017.
[5] Li F., Xin X., and Hu Y., “ID-based Threshold Proxy Signcryption Scheme from Bilinear Pairings,” International Journal of Security and Networks, vol. 3, no. 3, pp. 206-215, 2008.
[6] Li H. and Pang L., “Cryptanalysis of Wang et al.’s Improved Anonymous Multi-receiver Identity-based Encryption Scheme,” IET Information Security, vol. 8, no. 1, pp. 8-11, 2014.
[7] Li H., Chen X., Pang L., and Shi W., “Quantum Attack-resistent Certificateless Multi-receiver Signcryption Scheme,” PloS One, vol. 8, no. 6, 2013.
[8] Lin H., Wu T., Huang S., and Yeh Y., “Efficient Proxy Signcryption Scheme with Provable CCA and CMA Security,” Computers and Mathematics with Applications, vol. 60, no. 7, pp. 1850-1858, 2010.
[9] Lu G., Xue L., Nie X., and Qin Z., “Cryptanalysis of Novel Extended Multivariate Public Key Cryptosystem with Invertible Cycle,” International Journal of Network Security, vol. 20, no. 3, pp. 509-514, 2018.
[10] Pan C., Li S., Zhu Q., Wang C., and Zhang M., “Notes on Proxy Signcryption and Multi-proxy Signature Schemes,” International Journal of Network Security, vol. 17, no. 1, pp. 29-33, 2015.
[11] Pang L., Hu Y., Liu Y., and Xu K., “Efficient and Secure Certificateless Signature Scheme in the Standard Model,” International Journal of Communication Systems, vol. 30, no. 5, pp. 1-14, 2017.
[12] Shor P., “Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer,” SIAM Review, vol. 41, no. 2, pp. 303-332, 1999.
[13] Swapna G., Gopal P., Gowri T., and Reddy V., “An Efficient ID-based Proxy Signcryption Scheme,” International Journal of Information and Network Security, vol. 1, no. 3, pp. 200-206, 2012.
[14] Tanwar S. and Kumar A., “Extended Identity based Multi-signcryption Scheme with Public Verifiability,” Journal of Information and Optimization Sciences, vol. 39, no. 2, pp. 503- 517, 2018.
[15] Wang M. and Liu Z., “Identity based Threshold Proxy Signcryption Scheme,” in Proceedings of the 5th International Conference on Computer and Information Technology, Shanghai, pp. 695- 699, 2005.
[16] Wang Q., Cao Z., and Wang S., “Formalized Security Model of Multi-proxy Signature Schemes,” in Proceedings of the 5th International 206 The International Arab Journal of Information Technology, Vol. 17, No. 2, March 2020 Conference on Computer and Information Technology, Shanghai, pp. 668-672, 2005.
[17] Xue Q., Li F., Ge G., Shen J., and Cao Z., “Position-based Proxy Signcryption,” in Proceedings of IEEE/CIC International Conference on Communications in China, Shenzhen, pp. 1-6, 2015.
[18] Yang J. and Yu Z., “New Identity-based Threshold Proxy Signcryption Scheme,” Journal of Computer Applications, vol. 30, no. 1, pp. 121- 124, 2010.
[19] Yeh J., “The Insecurity of Two Proxy Signcryption Schemes: Proxy Credential Forgery Attack and How to Prevent It,” The Journal of Supercomputing, vol. 70, no. 3, pp. 1100-1119, 2014.
[20] Zheng Y., “Digital Signcryption or How to Achieve Cost (Signature and Encryption) ≪ Cost (Signature)+Cost (Encryption),” in Proceeding of Annual International Cryptology Conference, Santa Barbara, pp. 165-179, 1997.
[21] Zhou M. and Yu Z., “New Double-threshold Proxy Signcryption Scheme from Bilinear Pairings,” Computer Engineering and Applications, vol. 47, no. 32, pp. 98-100, 2011. Li Huixian is an Associate Professor with School of Computer Science and Engineering, Northwestern Polytechnical University, Xi’an, China Her main research interests include information security, cryptography and secure protocols. Gao Jin is currently pursuing the Master degree in School of Computer Science and Engineering, Northwestern Polytechnical University, Xi’an, China. His research interest focuses on attribute- based encryption. Wang Lingyun is currently pursuing the Master degree in School of Computer Science and Engineering, Northwestern Polytechnical University, Xi’an, China His research interest focuses on multivariate public key cryptosystem Pang Liaojun is a full professor with State Key Laboratory of Integrated Services Networks of Xidian University, and at the same time he was a visiting scholar at the Department of Computer Science of Wayne State University of USA His research interests include Internet security, cryptography, secure mobile agent system and e-commerce security technology. He became a Member (M) of IEEE in 2009.
