A Decentralized Signcryption Scheme Based on CFL

The rapid advancement of quantum computing technology poses a significant threat to conventional public key cryptographic infrastructure. The SM2 (state key cryptography algorithm no. 2) elliptic curve public key cryptographic algorithm, which adopts elliptic curve cryptography, has demonstrated str...

Full description

Saved in:
Bibliographic Details
Main Authors: Leyi Shi, Mengting Liu
Format: Article
Language:English
Published: MDPI AG 2025-03-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/25/6/1773
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850280024894078976
author Leyi Shi
Mengting Liu
author_facet Leyi Shi
Mengting Liu
author_sort Leyi Shi
collection DOAJ
description The rapid advancement of quantum computing technology poses a significant threat to conventional public key cryptographic infrastructure. The SM2 (state key cryptography algorithm no. 2) elliptic curve public key cryptographic algorithm, which adopts elliptic curve cryptography, has demonstrated strong resistance to quantum attacks. However, existing signcryption schemes remain vulnerable due to their reliance on a single certification authority (CA) managing all keys. The cryptography fundamental logics (CFL) authentication process eliminates the need for third-party involvement, achieving decentralized authentication and reducing the burden on certificate generation centers. Therefore, a decentralized signcryption scheme based on CFL was proposed using the SM2 national cryptographic algorithm. Unlike traditional signcryption schemes, this approach does not depend on the certification authority’s private key during the public–private key generation process. This innovation helps avoid risks associated with certification authority private key leakage and ensures decentralized characteristics. The proposed scheme was rigorously verified under the random oracle model (ROM) and based on the complexity assumption of the elliptic curve Diffie–Hellman (ECDH) problem. The theoretical analysis and experimental results demonstrate that compared to traditional methods, the proposed scheme exhibits higher efficiency in communication and computation. Specifically, the proposed scheme reduces computational overheads by approximately 30% and communication overheads by approximately 20% in practical working environments. These quantitative improvements highlight the scheme’s promising application prospects and practical value.
format Article
id doaj-art-8e34c74164694f66aff6b3374baed14c
institution OA Journals
issn 1424-8220
language English
publishDate 2025-03-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj-art-8e34c74164694f66aff6b3374baed14c2025-08-20T01:48:54ZengMDPI AGSensors1424-82202025-03-01256177310.3390/s25061773A Decentralized Signcryption Scheme Based on CFLLeyi Shi0Mengting Liu1College of Computer Science and Technology, China University of Petroleum, Qingdao 266580, ChinaCollege of Computer Science and Technology, China University of Petroleum, Qingdao 266580, ChinaThe rapid advancement of quantum computing technology poses a significant threat to conventional public key cryptographic infrastructure. The SM2 (state key cryptography algorithm no. 2) elliptic curve public key cryptographic algorithm, which adopts elliptic curve cryptography, has demonstrated strong resistance to quantum attacks. However, existing signcryption schemes remain vulnerable due to their reliance on a single certification authority (CA) managing all keys. The cryptography fundamental logics (CFL) authentication process eliminates the need for third-party involvement, achieving decentralized authentication and reducing the burden on certificate generation centers. Therefore, a decentralized signcryption scheme based on CFL was proposed using the SM2 national cryptographic algorithm. Unlike traditional signcryption schemes, this approach does not depend on the certification authority’s private key during the public–private key generation process. This innovation helps avoid risks associated with certification authority private key leakage and ensures decentralized characteristics. The proposed scheme was rigorously verified under the random oracle model (ROM) and based on the complexity assumption of the elliptic curve Diffie–Hellman (ECDH) problem. The theoretical analysis and experimental results demonstrate that compared to traditional methods, the proposed scheme exhibits higher efficiency in communication and computation. Specifically, the proposed scheme reduces computational overheads by approximately 30% and communication overheads by approximately 20% in practical working environments. These quantitative improvements highlight the scheme’s promising application prospects and practical value.https://www.mdpi.com/1424-8220/25/6/1773signcryptionCFLprovable securityrandom oracle modelSM2
spellingShingle Leyi Shi
Mengting Liu
A Decentralized Signcryption Scheme Based on CFL
Sensors
signcryption
CFL
provable security
random oracle model
SM2
title A Decentralized Signcryption Scheme Based on CFL
title_full A Decentralized Signcryption Scheme Based on CFL
title_fullStr A Decentralized Signcryption Scheme Based on CFL
title_full_unstemmed A Decentralized Signcryption Scheme Based on CFL
title_short A Decentralized Signcryption Scheme Based on CFL
title_sort decentralized signcryption scheme based on cfl
topic signcryption
CFL
provable security
random oracle model
SM2
url https://www.mdpi.com/1424-8220/25/6/1773
work_keys_str_mv AT leyishi adecentralizedsigncryptionschemebasedoncfl
AT mengtingliu adecentralizedsigncryptionschemebasedoncfl
AT leyishi decentralizedsigncryptionschemebasedoncfl
AT mengtingliu decentralizedsigncryptionschemebasedoncfl