Informatica logo


Login Register

  1. Home
  2. Issues
  3. Volume 36, Issue 3 (2025)
  4. LRSC-AMRS: Leakage-Resilient and Seamles ...

Informatica

Information Submit your article For Referees Help ATTENTION!
  • Article info
  • Full article
  • Related articles
  • More
    Article info Full article Related articles

LRSC-AMRS: Leakage-Resilient and Seamlessly Compatible Anonymous Multi-Recipient Signcryption in Heterogeneous Public-Key Cryptographies
Volume 36, Issue 3 (2025), pp. 737–764
Yuh-Min Tseng   Ting-Chieh Ho   Sen-Shan Huang  

Authors

 
Placeholder
https://doi.org/10.15388/25-INFOR600
Pub. online: 11 September 2025      Type: Research Article      Open accessOpen Access

Received
1 April 2025
Accepted
1 September 2025
Published
11 September 2025

Abstract

Anonymous multi-recipient signcryption (AMRS) is an important scheme of public-key cryptography (PKC) and applied for many modern digital applications. In an AMRS scheme, a broadcast management centre (BMC) may sign and encrypt a plaintext data (or file) to a set of multiple recipients. Meanwhile, only these recipients in the set can decrypt the plaintext data and authenticate the BMC while offering anonymity of their identities. In the past, some AMRS schemes based on various PKCs have been proposed. Recently, due to side-channel attacks, the existing cryptographic mechanisms could be broken so that leakage-resilient PKC resisting such attacks has attracted the attention of cryptographic researches. However, the work on the design of leakage-resilient AMRS (LR-AMRS) schemes is little and only suitable for multiple recipients under a single PKC. In this paper, the first leakage-resilient and seamlessly compatible AMRS (LRSC-AMRS) in heterogeneous PKCs is proposed. In the proposed scheme, multiple recipients can be members of two heterogeneous PKCs, namely, the public-key infrastructure PKC (PKI-PKC) or the certificateless PKC (CL-PKC). Also, we present a seamlessly compatible upgradation procedure from the PKI-PKC to the CL-PKC. The proposed scheme achieves three security properties under side-channel attacks, namely, encryption confidentiality, recipient anonymity and sender (i.e. BMC) authentication, which are formally shown by the associated security theorems. Finally, by comparing with related schemes, it is shown that the proposed LRSC-AMRS scheme is suitable for heterogeneous recipients and the computational cost of each recipient’s unsigncryption algorithm is constant $O(1)$.

References

 
Biham, E., Carmeli, Y., Shamir, A. (2008). Bug attacks. In: Advances in Cryptology – CRYPTO’08, LNCS, Vol. 5157, pp. 221–240.
 
Boneh, D., Franklin, M. (2001). Identity-based encryption from the Weil pairing. In: Advances in Cryptology – CRYPTO’01, LNCS, Vol. 2139, pp. 213–229.
 
Boneh, D., Boyen, X., Goh, E.J. (2005). Hierarchical identity-based encryption with constant size ciphertext. In: Advances in Cryptology – EUROCRYPT’05, LNCS, Vol. 3494, pp. 440–456.
 
Brumley, D., Boneh, D. (2005). Remote timing attacks are practical. Computer Networks, 48(5), 701–716.
 
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A. (2008). Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing, 38(1), 97–139.
 
Dong, C., Zhang, J. (2024). On the security of multi-receiver certificateless generalized signcryption scheme for WBANs. IEEE Transactions on Dependable and Secure Computing, 21(4), 4302–4303.
 
ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4), 469–472.
 
Galindo, D., Vivek, S. (2013). A practical leakage-resilient signature scheme in the generic group model. In: Selected Areas in Cryptography, SAC’12, LNCS, Vol. 7707, pp. 50–65.
 
Ho, T.-C., Tseng, Y.-M., Huang, S.-S. (2024). Leakage-resilient hybrid signcryption in heterogeneous public-key systems. Informatica, 35(1), 131–154.
 
Kiltz, E., Pietrzak, K. (2010). Leakage resilient Elgamal encryption. In: Advances in Cryptology – ASIACRYPT’10, LNCS, Vol. 6477, pp. 595–612.
 
Kim, T., Jang, J., Jeon, G., Kim, J. (2024). Investigating driver preferences for traffic information using digital signage and road surface holograms. KSCE Journal of Civil Engineering, 28, 1475–1488.
 
Lal, S., Kushwah, P. (2009). Anonymous ID-based signcryption scheme for multiple receivers. IACR Cryptology ePrint Archive, Article-ID 345.
 
Li, H., Wu, C., Pang, L. (2022). Completely anonymous certificateless multi-receiver signcryption scheme with sender traceability. Journal of Information Security and Applications, 71, 103384.
 
Li, X., Gong, Y., Huang, K., Niu, Z. (2023). Over-the-air integrated sensing, communication, and computation in IoT networks. IEEE Wireless Communications, 30(1), 32–38.
 
Miller, V.S. (1985). Use of elliptic curves in cryptography. In: Advances in Cryptology – CRYPTO’85, LNCS, Vol. 218, pp. 417–426.
 
Park, Y., Zhang, Y. (2022). Technology readiness and technology paradox of unmanned convenience store users. Journal of Retailing and Consumer Services, 65, 102523.
 
Pang, L., Gao, L., Li, H., Wang, Y. (2015). Anonymous multi-receiver ID-based signcryption scheme. IET information Security, 9(3), 194–201.
 
Pang, L., Kou, M., Wei, M., Li, H. (2018). Efficient anonymous certificateless multi-receiver signcryption scheme without bilinear pairings. IEEE Access, 6, 78123–78135.
 
Pang, L., Kou, M., Wei, M., Li, H. (2019). Anonymous certificateless multi-receiver signcryption scheme without secure channel. IEEE Access, 7, 84091–84106.
 
Peng, A.-L., Tseng, Y.-M., Huang, S.-S. (2021). An efficient leakage-resilient authenticated key exchange protocol suitable for IoT devices. IEEE Systems Journal, 15(4), 5343–5354.
 
Rivest, R.L., Shamir, A., Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.
 
Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In: Advances in Cryptology – CRYPTO’84, LNCS, Vol. 196, pp. 47–53.
 
Shen, J., Gui, Z., Chen, X., Zhang, J., Xiang, Y. (2022). Lightweight and certificateless multi-receiver secure data transmission protocol for wireless body area networks. IEEE Transactions on Dependable and Secure Computing, 19(3), 1464–1475.
 
Tsai, T.-T., Tseng, Y.-M., Huang, S.-S., Xie, J.-Y., Hung, Y.-H. (2022). Leakage-resilient anonymous multi-recipient signcryption under a continual leakage model. IEEE Access, 10, 104636–104648.
 
Tseng, Y.-M., Huang, S.-S., Tsai, T.-T., Chuang, Y.-H., Hung, Y.-H. (2022). Leakage-resilient revocable certificateless encryption with an outsourced revocation authority. Informatica, 33(1), 151–179.
 
Tseng, Y.-M., Ho, T.-C., Tsai, T.-T., Huang, S.-S. (2024). AHMRE-SCST: lightweight anonymous heterogeneous multi-recipient encryption with seamlessly compatible system transformation for IoT devices. IEEE Internet of Things Journal, 11(17), 28508–28525.
 
Wang, H., Zhang, Y., Qin, B. (2012). Analysis and improvements of two identity based anonymous signcryption schemes for multiple receivers. In: Proceedings of IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1057–1062.
 
Wang, Q., He, M., Zheng, X. (2016). Privacy-preserving communication for vehicular with multi-receiver conditionally anonymous ring signcryption. In: Proceedings of 3rd International Conference on Materials Engineering, Manufacturing Technology and Control, pp. 496–501.
 
Wu, J.-D., Tseng, Y.-M., Huang, S.-S., Chou, W.-C. (2018). Leakage-resilient certificateless key encapsulation scheme. Informatica, 29(1), 125–155.
 
Wu, J.-D., Tseng, Y.-M., Huang, S.-S. (2019). An identity-based authenticated key exchange protocol resilient to continuous key leakage. IEEE Systems Journal, 13(4), 3968–3979.
 
Xie, J.-Y., Tseng, Y.-M., Huang, S.-S. (2023). Leakage-resilient anonymous multi-receiver certificateless encryption resistant to side-channel attacks. IEEE Systems Journal, 17(2), 2674–2685.
 
Xiong, H., Qin, Z. (2015). Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Transactions on Information Forensics and Security, 10(7), 1442–1455.
 
Zhang, B., Xu, Q. (2010). An ID-based anonymous signcryption scheme for multiple receivers secure in the standard model. In: Proceedings of Advances in Computer Science and Information Technology, LNCS, Vol. 6059, pp. 15–27.

Biographies

Tseng Yuh-Min
ymtseng@cc.ncue.edu.tw

Y.-M. Tseng is currently the vice president and a professor in the Department of Mathematics, National Changhua University of Education, Taiwan. He is a member of IEEE Computer Society, IEEE Communications Society and the Chinese Cryptology and Information Security Association (CCISA). He has published over one hundred scientific journal papers on various research areas of cryptography, security and computer network. His research interests include cryptography, network security, computer network and leakage-resilient cryptography. He serves as an editor of several international journals.

Ho Ting-Chieh

T.-C. Ho is currently pursuing the PhD degree with the Department of Mathematics, National Changhua University of Education, Changhua, Taiwan. Her research interests include applied cryptography, information security and leakage-resilience cryptography.

Huang Sen-Shan

S.-S. Huang received the PhD degree from the University of Illinois at Urbana–Champaign, Champaign, IL, USA, in 1997, under the supervision of Prof. B. C. Berndt. He is currently a Professor with the Department of Mathematics, National Changhua University of Education, Changhua, Taiwan. His research interests include number theory, cryptography, and leakage-resilient cryptography.


Full article Related articles PDF XML
Full article Related articles PDF XML

Copyright
© 2025 Vilnius University
by logo by logo
Open access article under the CC BY license.

Keywords
leakage resilience multiple recipients anonymity encryption authentication heterogeneous public-key cryptographies

Metrics
since January 2020
1023

Article info
views

227

Full article
views

933

PDF
downloads

883

XML
downloads

Export citation

Copy and paste formatted citation
Placeholder

Download citation in file


Share


RSS

INFORMATICA

  • Online ISSN: 1822-8844
  • Print ISSN: 0868-4952
  • Copyright © 2023 Vilnius University

About

  • About journal

For contributors

  • OA Policy
  • Submit your article
  • Instructions for Referees
    •  

    •  

Contact us

  • Institute of Data Science and Digital Technologies
  • Vilnius University

    Akademijos St. 4

    08412 Vilnius, Lithuania

    Phone: (+370 5) 2109 338

    E-mail: informatica@mii.vu.lt

    https://informatica.vu.lt/journal/INFORMATICA
Powered by PubliMill  •  Privacy policy