© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019
Jin Li, Zheli Liu and Hao Peng (eds.)Security and Privacy in New Computing EnvironmentsLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering284https://doi.org/10.1007/978-3-030-21373-2_43

A New Signcryption Scheme Based on Elliptic Curves

Wen-jun Cui1, Zhi-juan Jia1, Ming-sheng Hu1  , Bei-Gong1, 2   and Li-peng Wang1
(1)
College of Information Science and Technology, Zhengzhou Normal University, Zhengzhou, 450044, China
(2)
Beijing University of Technology, Beijing, 100124, China
 
 
Ming-sheng Hu (Corresponding author)
 
Bei-Gong

Abstract

Based on the intractable problem of discrete logarithm in ECC and the intractability of reversing a one-way hash function, this paper presents a signcryption scheme with public verifiability and forward security. In the process of security proof, the unforgeability ensures that the attacker can’t create a valid ciphertext. We verify the cipher text $$ c $$ instead of the plain text $$ m $$ in verification phase. We protect the plain text $$ m $$, which makes the proposed scheme confidential. Thus, the proposed scheme has the property of public verification. And the scheme ensures that if the sender’s private key is compromised, but the attacker can’t recover original message $$ m $$ from cipher text $$ (c,R,s) $$. By the performance analysis, our proposed scheme mainly uses the model multiplication. Compared with Zhou scheme, the number of model multiplication has lost one time in signcryption phase, which leads to the significant increase in calculation rate. Moreover, the signature length has lost $$ 2|n| $$ compared with Zhou scheme. In other words, the minimum value of complexity is reached in theory. This makes the scheme have higher security and wider applications.

Keywords

Public verifiabilityForward securityUnforgeabilityModel multiplication

1 Introduction

From the invention of public key cryptography to the 1990s, delivering an arbitrary length’s message in a secure and authenticated way with an expense less than that required by signature-then-encryption seemed to have never been solved. Fortunately, Zheng discovered a new cryptographic primitive termed as “signcryption”, which satisfied both the functions of digital signature and public key encryption in a logically single step simultaneously, and with a cost significantly smaller than that required by signature-then-encryption. The saving in cost growed proportionally to the size of security parameters [1]. Based on elliptic curve cryptosystems, a new signcryption was presented, and it saved the communication cost at least 1.25 times and enhanced computation cost 1.19 times over ECDSA-then-PSCE-1 [2]. The signcryption scheme, which can be verified by the third party after the specific recipient removed his key information, was a publicly verifiable scheme. Analysis showed that the proposed scheme is secure against the adaptive chosen ciphertext attack [2]. Combining digital signature and encryption functions, an efficient signcryption scheme based on elliptic curve was proposed [3]. The scheme takes lower computation and communication cost to provide security functions. It not only provides message confidentiality, authentication, integrity, unforgeability, and non-repudiation, but also forward secrecy for message confidentiality and public verification. And the judge can verify sender’s signature directly without the sender’s private key when dispute occurs [3].

A signcryption scheme with public verifiability and forward security was shown in [4]. An open problem on the design of signcryption was successfully solved. And the security properties of this scheme was proved in detail [4]. By using verifiable secret sharing and secure multi-party computation, the authors proposed a protocol for threshold generation of the signcryption [5]. Because point addition couldn’t map coordinate addition directly, a linear sum of coordinates to reconstruct the private coordinate was introduced. And the complexity is less than the same schemes based on DLP (Discrete Logarithm Problem) [5]. An enhancement of the e-mail protocol using signcryption based on Elliptic curve was introduced, and it provided confidentiality, authenticity, integrity, unforgeability, non-repudiation, forward secrecy and public verifiability [6]. [7] highlighted limitations of the existing ECC based schemes using signcryption. These limitations include some missing security aspects as well as high computation power requirement, more communication overhead incurred and large memory requirements. Moreover, [7] proposed an efficient lightweight signcryption scheme based on HECC which satisfied all the security requirements. Compared with existing signcryption schemes, the scheme reduced significant amounts of computation, communication costs and message size [7].

New signcryption schemes based on elliptic curve cryptography were introduced [8]. The security of proposed schemes is based on elliptic curve discrete logarithm problem (ECDLP) and elliptic curve Diffie-Hellman problem (ECDHP). The proposed schemes provided various desirable security requirements like confidentiality, authenticity, non-repudiation and forward security as well as chosen ciphertext attack and unforgeability [8]. A public verifiable signcryption scheme with forward security was presented in [9]. In this scheme, the verification process didn’t need the sender’s private key, a parameter was hided in the index, so attacked who obtained the sender’s private key wouldn’t get any secret information between these participates before this communication. And furthermore, authentication and message recovery was not separated, but in the process of public verify, the message confidentiality won’t be damaged [9]. An improvement scheme was proposed with public verifiability and forward security, the correctness and security were proved in [10]. The efficiency of the scheme was increased significantly compared with two existing schemes. Moreover, a new signcryption scheme based on elliptic curves was proposed with public verifiability and forward security. In the algorithm, both the numbers of model multiplication and model inverse were reached the minimum four times and zero times, the efficiency of the algorithm was increased significantly compared with the existing signcryption scheme [10]. The authors extended hybrid signcryption technique to the certificateless setting, and constructed a provably secure certificateless hybrid signcryption (PS-CLHS) scheme [11]. In the random oracle model,the authors proved that the proposed scheme satisfies the indistinguishability and unforgeability under the hardness of the bilinear Diffie-Hellman problem and computational Diffie-Hellman problem [11].

2 Preliminaries

For convenience of the readers, we will recall some basic facts and some useful properties. For more details, the readers can refer to [3, 1214].

2.1 Elliptic Curve

An elliptic curve is defined as a nonsingular cubic curve over finite field in two variables, $$ f(x,y) = 0 $$, with a rational point (which may be a point at infinity) which satisfy the equation: $$ y^{2} = x^{3} + ax + b $$. The field $$ T $$ is generally taken to be the complex numbers, reals, rationales, or a finite field.

2.2 Elliptic Curves Over $$ GF(p) $$

Elliptic Curve Cryptography (ECC) was discovered in 1985 by Victor Miller (IBM) and Neil Koblitz as an alternative mechanism for implementing public-key cryptography based on elliptic curve over finite field.

An elliptic curve $$ E $$ over $$ R $$ (real numbers) is defined by a Weierstrass equation
$$ y^{2} + a_{1} xy + a_{3} y = x^{3} + a_{2} x^{2} + a_{4} x + a_{6} $$
where $$ a_{1} ,a_{2} ,a_{3} ,a_{4} ,a_{6} \in T $$. By performing the change of variables, we get one of the simplified Weierstrass equations
$$ y^{2} = x^{3} + ax + b\,\,{\text{where}}\,4a^{3} + 27b^{2} \ne 0, $$
together with a special point 0 called the point at infinity. $$ G $$ is a generator of elliptic curve. $$ n $$ is the order of $$ G $$, which satisfies $$ nG = 0 $$.

2.3 Elliptic Curve Discrete Logarithm Problem

ECC is based on discrete logarithm that is much more difficult to challenge at equivalent key lengths as compare to other public key cryptography.

Let $$ P $$ and $$ Q $$ be two points of an elliptic curve with order $$ n $$ and $$ n $$ is a prime. The point $$ Q = kP $$ where $$ k < n $$. Given these two points $$ P $$ and $$ Q $$, find the correct $$ k $$ of $$ Q $$. Up to now, it is computational infeasible to generate $$ k $$ from $$ P $$ and $$ Q $$.

2.4 Hash Function

A hash function takes a group of characters and maps it to a value of a certain length called a hash value or message digest. The hash value is representative of the original string of characters, but is normally smaller than the original. Hash function is mainly used to generate a fixed length of string. Hash function can be divided into weak no-collision hash function and strong no-collision hash function.

Hash function is weak no-collision if a given an information $$ x $$ and there be an information which contents is unfeasible.

Hash function is strong no-collision if an information $$ x^{\prime} \ne x $$ which contents to $$ h(x) = h(x^{{\prime }} ) $$ is unfeasible.

3 The Proposed Scheme

Most of existing schemes can’t simultaneously provide public verifiability and forward security. To solve this problem, based on the intractable problem of discrete logarithm in ECC and the intractability of reversing a one-way hash function, this paper presents a public verifiable signcryption scheme with forward security.

3.1 Initialization Phase

In this phase, we should select and publish some parameters as follows:

Set $$ E $$ is an elliptic curve over $$ GF(p) $$, $$ G $$ is a generator of elliptic curve $$ E $$. The sender A randomly selects an integer $$ x_{A} \in Z_{n}^{ * } $$ as her private key. Meanwhile, A computes her public key $$ y_{A} = x_{A} G $$. Similarly, the recipient B also selects private key $$ x_{B} \in Z_{n}^{ * } $$ and public key $$ y_{B} = x_{B} G $$, $$ (E^{{\prime }} ,D^{{\prime }} ) $$ is the secure encryption and decryption pair.

3.2 Signcryption Phase

The sender A randomly selects $$ r \in Z_{n}^{ * } $$, then $$ R = rG $$, $$ K = ry_{B} = (k,l) $$. Generating cipher text $$ c = E_{k}^{{\prime }} (m) $$. Computing Hash function value $$ e = h(c) $$, Hamming weight $$ d = ham\;(e)\; $$, $$ s = r + d + x_{A} \;\bmod \;n $$. A Sends the signcrypted text $$ (c,R,s) $$ to B.

3.3 Unsigncryption Phase

B receives the signcrypted text $$ (c,R,s) $$. Computing $$ K = x_{B} R = (k,l) $$, Hash function value $$ e = h(c) $$, Hamming weight $$ d = ham\;(e)\; $$, $$ t = (s - d)\;\bmod \;n $$. Generating plain text $$ m = D_{k}^{{\prime }} (c) $$.

Verifying $$ tG - y_{A} $$ is equal to $$ R $$ or not. If it is true then B accepts $$ (c,R,s) $$ which is sent by A.

The signcrypted text $$ (c,R,s) $$ is a valid one, its correctness is given below.
$$ (s - d)G - y_{A} = (r + d + x_{A} - d)G - x_{A} G = rG = R. $$

4 Analysis of the Proposed Scheme

In this section, there is a discussion of the security aspects of the proposed scheme.

4.1 Security Proof

The proposed work not only provides unforgeability and non-repudiation (public verification) but also forward secrecy.
  1. 1.

    Unforgeability

     
Unforgeability ensures that the attacker can’t create a valid ciphertext. In the proposed scheme, the attacker cannot create a valid $$ (c,R,s) $$ without the private key of the sender A. If an attacker forges a valid $$ (c^{{\prime }} ,R^{{\prime }} ,s^{{\prime }} ) $$ from previous $$ (c,R,s) $$, the key is to generate a correct $$ s^{\prime} $$. Since $$ s = r + d + x_{A} $$, the attacker must get random $$ r $$ and $$ x_{A} $$, which the attacker can’t get obviously. To obtain $$ x_{A} $$ from $$ y_{A} = x_{A} G $$ and $$ r $$ from $$ R = rG $$, then the attacker has to solve ECDLP firstly but it is computationally infeasible. Therefore, our proposed scheme satisfies unforgeability.
  1. 2.

    Non-repudiation

     

The proposed scheme provides the non-repudiation property. Namely, the proposed scheme has the property of public verifiability. When dispute occurs for the sender and recipient, the recipient can send $$ (c,R,s) $$ to the Third-party Trusted Center for settling whether the original cipher text $$ c $$ sent by the sender. During this process, the Third-party Trusted Center can determine whether the signature is generated by the sender, because only the sender can use her own private key $$ x_{A} $$ to generate correct signature $$ s $$. Thus, the proposed scheme satisfies non-repudiation property.

Meanwhile, we verify the cipher text $$ c $$ instead of the plain text $$ m $$ in verification phase. We protect the plain text $$ m $$, which makes the proposed scheme confidential. Therefore, the proposed scheme has the property of public verification.
  1. 3.

    Forward secrecy

     
The proposed scheme ensures that if the sender’s private key is compromised, but the attacker can’t recover original message $$ m $$ from cipher text $$ (c,R,s) $$. In the proposed scheme if the attacker tries to derive plain text $$ m $$, he has to get the secret key $$ k $$ because of $$ m = D_{k}^{{\prime }} (c) $$. There are two ways to deduce $$ k $$:
  1. (1)

    We need know $$ r $$ because of $$ K = ry_{B} = (k,l) $$. However, to obtain $$ r $$ from $$ R = rG $$, then the attacker has to solve ECDLP firstly but it is computationally infeasible.

     
  2. (2)

    We need know $$ x_{B} $$ because of $$ K = x_{B} R = (k,l) $$. But as B’s private key, $$ x_{B} $$ can’t be got.

     

Therefore our proposed scheme provides forward secrecy.

4.2 Performance Analysis

We compare cost of our proposed work with some elliptic curve cryptography schemes and try to reduce the cost of computation. Recently, our proposed scheme and Zhou scheme [10] simultaneously provide public verifiability and forward security. Same as Zhou scheme [10], both the numbers of model index and model inverse are reached the minimum zero times. Compared with Zhou scheme [10], the number of model multiplication has lost one time in signcryption phase, which leads to the significant increase in calculation rate. Moreover, the signature length has lost $$ 2|n| $$ compared with Zhou scheme. In other words, the minimum value of complexity is reached in theory (Table 1).
Table 1.

Performance Comparison

 

Zhou scheme [10]

The proposed scheme

Signcryption phase

Unsigncryption phase

Signcryption phase

Unsigncryption phase

Model index

0

0

0

0

Model inverse

0

0

0

0

Model multiplication

2

1

1

1

Hash function

1

1

1

1

Signature length

$$ 5|n| $$

$$ 3|n| $$

5 Conclusion

Based on the intractable problem of discrete logarithm in ECC and the intractability of reversing a one-way hash function, this paper presents a public verifiable signcryption scheme with forward security. In the process of security proof, the unforgeability ensures that the attacker can’t create a valid ciphertext. We verify the cipher text $$ c $$ instead of the plain text $$ m $$ in verification phase. We protect the plain text $$ m $$, which makes the proposed scheme confidential. Thus, the proposed scheme has the property of public verification. And the scheme ensures that if the sender’s private key is compromised, but the attacker can’t recover original message $$ m $$ from cipher text $$ (c,R,s) $$. By the performance analysis, our proposed scheme mainly uses the model multiplication. Compared with Zhou scheme [10], the number of model multiplication has lost one time in signcryption phase, which leads to the significant increase in calculation rate. Moreover, the signature length has lost $$ 2|n| $$ compared with Zhou scheme. In other words, the minimum value of complexity is reached in theory. This makes the scheme have higher security and wider applications.