A Decentralized Signcryption Scheme Based on CFL
The rapid advancement of quantum computing technology poses a significant threat to conventional public key cryptographic infrastructure. The SM2 (state key cryptography algorithm no. 2) elliptic curve public key cryptographic algorithm, which adopts elliptic curve cryptography, has demonstrated str...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2025-03-01
|
| Series: | Sensors |
| Subjects: | |
| Online Access: | https://www.mdpi.com/1424-8220/25/6/1773 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850280024894078976 |
|---|---|
| author | Leyi Shi Mengting Liu |
| author_facet | Leyi Shi Mengting Liu |
| author_sort | Leyi Shi |
| collection | DOAJ |
| description | The rapid advancement of quantum computing technology poses a significant threat to conventional public key cryptographic infrastructure. The SM2 (state key cryptography algorithm no. 2) elliptic curve public key cryptographic algorithm, which adopts elliptic curve cryptography, has demonstrated strong resistance to quantum attacks. However, existing signcryption schemes remain vulnerable due to their reliance on a single certification authority (CA) managing all keys. The cryptography fundamental logics (CFL) authentication process eliminates the need for third-party involvement, achieving decentralized authentication and reducing the burden on certificate generation centers. Therefore, a decentralized signcryption scheme based on CFL was proposed using the SM2 national cryptographic algorithm. Unlike traditional signcryption schemes, this approach does not depend on the certification authority’s private key during the public–private key generation process. This innovation helps avoid risks associated with certification authority private key leakage and ensures decentralized characteristics. The proposed scheme was rigorously verified under the random oracle model (ROM) and based on the complexity assumption of the elliptic curve Diffie–Hellman (ECDH) problem. The theoretical analysis and experimental results demonstrate that compared to traditional methods, the proposed scheme exhibits higher efficiency in communication and computation. Specifically, the proposed scheme reduces computational overheads by approximately 30% and communication overheads by approximately 20% in practical working environments. These quantitative improvements highlight the scheme’s promising application prospects and practical value. |
| format | Article |
| id | doaj-art-8e34c74164694f66aff6b3374baed14c |
| institution | OA Journals |
| issn | 1424-8220 |
| language | English |
| publishDate | 2025-03-01 |
| publisher | MDPI AG |
| record_format | Article |
| series | Sensors |
| spelling | doaj-art-8e34c74164694f66aff6b3374baed14c2025-08-20T01:48:54ZengMDPI AGSensors1424-82202025-03-01256177310.3390/s25061773A Decentralized Signcryption Scheme Based on CFLLeyi Shi0Mengting Liu1College of Computer Science and Technology, China University of Petroleum, Qingdao 266580, ChinaCollege of Computer Science and Technology, China University of Petroleum, Qingdao 266580, ChinaThe rapid advancement of quantum computing technology poses a significant threat to conventional public key cryptographic infrastructure. The SM2 (state key cryptography algorithm no. 2) elliptic curve public key cryptographic algorithm, which adopts elliptic curve cryptography, has demonstrated strong resistance to quantum attacks. However, existing signcryption schemes remain vulnerable due to their reliance on a single certification authority (CA) managing all keys. The cryptography fundamental logics (CFL) authentication process eliminates the need for third-party involvement, achieving decentralized authentication and reducing the burden on certificate generation centers. Therefore, a decentralized signcryption scheme based on CFL was proposed using the SM2 national cryptographic algorithm. Unlike traditional signcryption schemes, this approach does not depend on the certification authority’s private key during the public–private key generation process. This innovation helps avoid risks associated with certification authority private key leakage and ensures decentralized characteristics. The proposed scheme was rigorously verified under the random oracle model (ROM) and based on the complexity assumption of the elliptic curve Diffie–Hellman (ECDH) problem. The theoretical analysis and experimental results demonstrate that compared to traditional methods, the proposed scheme exhibits higher efficiency in communication and computation. Specifically, the proposed scheme reduces computational overheads by approximately 30% and communication overheads by approximately 20% in practical working environments. These quantitative improvements highlight the scheme’s promising application prospects and practical value.https://www.mdpi.com/1424-8220/25/6/1773signcryptionCFLprovable securityrandom oracle modelSM2 |
| spellingShingle | Leyi Shi Mengting Liu A Decentralized Signcryption Scheme Based on CFL Sensors signcryption CFL provable security random oracle model SM2 |
| title | A Decentralized Signcryption Scheme Based on CFL |
| title_full | A Decentralized Signcryption Scheme Based on CFL |
| title_fullStr | A Decentralized Signcryption Scheme Based on CFL |
| title_full_unstemmed | A Decentralized Signcryption Scheme Based on CFL |
| title_short | A Decentralized Signcryption Scheme Based on CFL |
| title_sort | decentralized signcryption scheme based on cfl |
| topic | signcryption CFL provable security random oracle model SM2 |
| url | https://www.mdpi.com/1424-8220/25/6/1773 |
| work_keys_str_mv | AT leyishi adecentralizedsigncryptionschemebasedoncfl AT mengtingliu adecentralizedsigncryptionschemebasedoncfl AT leyishi decentralizedsigncryptionschemebasedoncfl AT mengtingliu decentralizedsigncryptionschemebasedoncfl |