{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T15:49:27Z","timestamp":1766159367298},"reference-count":43,"publisher":"Vilnius University Press","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"abstract":"<jats:p>Signcryption integrates both signature and encryption schemes into single scheme to ensure both content unforgeability (authentication) and message confidentiality while reducing computational complexity. Typically, both signers (senders) and decrypters (receivers) in a signcryption scheme belong to the same public-key systems. When signers and decrypters in a signcryption scheme belong to heterogeneous public-key systems, this scheme is called a hybrid signcryption scheme which provides more elastic usage than typical signcryption schemes. In recent years, a new kind of attack, named side-channel attack, allows adversaries to learn a portion of the secret keys used in cryptographic algorithms. To resist such an attack, leakage-resilient cryptography has been widely discussed and studied while a large number of leakage-resilient schemes have been proposed. Also, numerous hybrid signcryption schemes under heterogeneous public-key systems were proposed, but none of them possesses leakage-resilient property. In this paper, we propose the first hybrid signcryption scheme with leakage resilience, called leakage-resilient hybrid signcryption scheme, in heterogeneous public-key systems (LR-HSC-HPKS). Security proofs are demonstrated to show that the proposed scheme provides both authentication and confidentiality against two types of adversaries in heterogeneous public-key systems.<\/jats:p>","DOI":"10.15388\/24-infor546","type":"journal-article","created":{"date-parts":[[2024,3,6]],"date-time":"2024-03-06T08:02:13Z","timestamp":1709712133000},"page":"131-154","source":"Crossref","is-referenced-by-count":1,"title":["Leakage-Resilient Hybrid Signcryption in Heterogeneous Public-key Systems"],"prefix":"10.15388","author":[{"given":"Ting-Chieh","family":"Ho","sequence":"first","affiliation":[]},{"given":"Yuh-Min","family":"Tseng","sequence":"additional","affiliation":[]},{"given":"Sen-Shan","family":"Huang","sequence":"additional","affiliation":[]}],"member":"6097","published-online":{"date-parts":[[2024,3,6]]},"reference":[{"key":"2024031410105664295_j_infor546_ref_001","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1007\/978-3-642-00457-5_28","volume-title":"Theory of Cryptography, TCC\u201909","volume":"5444","year":"2009"},{"issue":"10","key":"2024031410105664295_j_infor546_ref_002","doi-asserted-by":"crossref","first-page":"11266","DOI":"10.1109\/TVT.2020.3008781","article-title":"An efficient hybrid signcryption scheme with conditional privacy-preservation for heterogeneous vehicular communication in VANETs","volume":"69","year":"2020","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2024031410105664295_j_infor546_ref_003","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2003","volume":"2894","year":"2003"},{"key":"2024031410105664295_j_infor546_ref_004","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/978-3-642-03356-8_3","volume-title":"Advances in Cryptology \u2013 CRYPTO 2009","volume":"5677","year":"2009"},{"issue":"2","key":"2024031410105664295_j_infor546_ref_005","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/s00145-007-0211-0","article-title":"Formal proofs for the security of signcryption","volume":"20","year":"2007","journal-title":"Journal of Cryptology"},{"key":"2024031410105664295_j_infor546_ref_006","first-page":"369","volume-title":"Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS\u201908","year":"2008"},{"key":"2024031410105664295_j_infor546_ref_007","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/978-3-540-85174-5_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2008","volume":"5157","year":"2008"},{"key":"2024031410105664295_j_infor546_ref_008","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2001","volume":"2139","year":"2001"},{"key":"2024031410105664295_j_infor546_ref_009","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1007\/11426639_26","volume-title":"Advances in Cryptology\u2013EURO\u2013CRYPT 2005, Eurocrypt\u201905","volume":"3494","year":"2005"},{"issue":"5","key":"2024031410105664295_j_infor546_ref_010","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1016\/j.comnet.2005.01.010","article-title":"Remote timing attacks are practical","volume":"48","year":"2005","journal-title":"Computer Networks"},{"issue":"1","key":"2024031410105664295_j_infor546_ref_011","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1137\/060651380","article-title":"Fuzzy extractors: how to generate strong keys from biometrics and other noisy data","volume":"38","year":"2008","journal-title":"SIAM Journal on Computing"},{"key":"2024031410105664295_j_infor546_ref_012","article-title":"An efficient signcryption of heterogeneous systems for internet of vehicles","volume":"113","year":"2021","journal-title":"Journal of Systems Architecture"},{"key":"2024031410105664295_j_infor546_ref_013","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1007\/978-3-642-35999-6_4","volume-title":"Selected Areas in Cryptography, SAC\u201912","volume":"7707","year":"2013"},{"issue":"3","key":"2024031410105664295_j_infor546_ref_014","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s13389-016-0121-x","article-title":"Implementation of a leakage-resilient ElGamal key encapsulation mechanism","volume":"6","year":"2016","journal-title":"Journal of Cryptographic Engineering"},{"issue":"8","key":"2024031410105664295_j_infor546_ref_015","article-title":"Heterogeneous signcryption scheme supporting equality test from PKI to CLC toward IoT","volume":"32","year":"2021","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"4","key":"2024031410105664295_j_infor546_ref_016","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1093\/comjnl\/bxq095","article-title":"Heterogeneous signcryption with key privacy","volume":"54","year":"2011","journal-title":"Computer Journal"},{"issue":"4","key":"2024031410105664295_j_infor546_ref_017","doi-asserted-by":"crossref","first-page":"2904","DOI":"10.1109\/JIOT.2017.2741580","article-title":"Provably secure identity-based signcryption scheme for crowdsourced industrial Internet of Things environments","volume":"5","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"key":"2024031410105664295_j_infor546_ref_018","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1007\/978-3-642-17373-8_34","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2010","volume":"6477","year":"2010"},{"issue":"3","key":"2024031410105664295_j_infor546_ref_019","doi-asserted-by":"crossref","first-page":"451","DOI":"10.3233\/JCS-2009-0374","article-title":"An efficient signcryption scheme with key privacy and its extension to ring signcryption","volume":"18","year":"2010","journal-title":"Journal of Computing and Security"},{"issue":"10","key":"2024031410105664295_j_infor546_ref_020","doi-asserted-by":"crossref","first-page":"3677","DOI":"10.1109\/JSEN.2013.2262271","article-title":"Practical secure communication for integrating wireless sensor networks into the Internet of Things","volume":"13","year":"2013","journal-title":"IEEE Sensors Journal"},{"key":"2024031410105664295_j_infor546_ref_021","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1016\/j.mcm.2012.06.011","article-title":"Certificateless hybrid signcryption","volume":"57","year":"2013","journal-title":"Mathematical and Computer Modelling"},{"issue":"3","key":"2024031410105664295_j_infor546_ref_022","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1109\/JSYST.2012.2221897","article-title":"Efficient signcryption for heterogeneous systems","volume":"7","year":"2013","journal-title":"IEEE Systems Journal"},{"key":"2024031410105664295_j_infor546_ref_023","first-page":"154","article-title":"Practical access control for sensor networks in the context of the internet of things","volume":"89\u201390","year":"2016","journal-title":"Computer Communications"},{"key":"2024031410105664295_j_infor546_ref_024","doi-asserted-by":"crossref","first-page":"1391","DOI":"10.1007\/s11277-016-3327-4","article-title":"Practical signcryption for secure communication of wireless sensor networks","volume":"89","year":"2016","journal-title":"Wireless Personal Communications"},{"key":"2024031410105664295_j_infor546_ref_025","doi-asserted-by":"crossref","first-page":"7854","DOI":"10.1109\/ACCESS.2018.2797102","article-title":"Mutual heterogeneous signcryption schemes for 5G network slicings","volume":"6","year":"2018","journal-title":"IEEE Access"},{"key":"2024031410105664295_j_infor546_ref_026","article-title":"Efficient heterogeneous signcryption scheme based on edge computing for industrial internet of things","volume":"136","year":"2023","journal-title":"Journal of Systems Architecture"},{"issue":"19","key":"2024031410105664295_j_infor546_ref_027","doi-asserted-by":"crossref","first-page":"19426","DOI":"10.1109\/JIOT.2022.3167102","article-title":"A pairing-free heterogeneous signcryption scheme for unmanned aerial vehicles","volume":"9","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"2024031410105664295_j_infor546_ref_028","doi-asserted-by":"crossref","first-page":"5343","DOI":"10.1109\/JSYST.2020.3038216","article-title":"An efficient leakage-resilient authenticated key exchange protocol suitable for IoT devices","volume":"15","year":"2021","journal-title":"IEEE Systems Journal"},{"issue":"2","key":"2024031410105664295_j_infor546_ref_029","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","year":"1978","journal-title":"Communications of ACM"},{"key":"2024031410105664295_j_infor546_ref_030","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/s11432-010-0061-5","article-title":"Efficient signcryption between TPKC and IDPKC and its multi-receiver construction","volume":"53","year":"2010","journal-title":"Science China Information Sciences"},{"key":"2024031410105664295_j_infor546_ref_031","doi-asserted-by":"crossref","first-page":"54448","DOI":"10.1109\/ACCESS.2023.3281612","article-title":"Leakage-resilient certificateless signcryption scheme under a continual leakage model","volume":"11","year":"2023","journal-title":"IEEE Access"},{"issue":"4","key":"2024031410105664295_j_infor546_ref_032","doi-asserted-by":"crossref","first-page":"464","DOI":"10.5755\/j01.itc.49.4.25927","article-title":"Leakage-resilient outsourced revocable certificateless signature with a cloud revocation server","volume":"49","year":"2020","journal-title":"Information Technology and Control"},{"key":"2024031410105664295_j_infor546_ref_033","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1109\/GCCE56475.2022.10014332","volume-title":"2022 IEEE 11th Global Conference on Consumer Electronics (GCCE)","year":"2022"},{"issue":"1","key":"2024031410105664295_j_infor546_ref_034","first-page":"151","article-title":"Leakage-resilient revocable certificateless encryption with an outsourced revocation authority","volume":"33","year":"2022","journal-title":"Informatica"},{"issue":"1","key":"2024031410105664295_j_infor546_ref_035","first-page":"199","article-title":"Fully continuous leakage-resilient certificate-based signcryption scheme for mobile communications","volume":"34","year":"2023","journal-title":"Informatica"},{"key":"2024031410105664295_j_infor546_ref_036","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.ins.2014.05.034","article-title":"Obtain confidentiality or\/and authenticity in big data by ID-based generalized signcryption","volume":"318","year":"2015","journal-title":"Information Sciences"},{"issue":"1","key":"2024031410105664295_j_infor546_ref_037","doi-asserted-by":"crossref","first-page":"125","DOI":"10.15388\/Informatica.2018.161","article-title":"Leakage-resilient certificateless key encapsulation scheme","volume":"29","year":"2018","journal-title":"Informatica"},{"issue":"4","key":"2024031410105664295_j_infor546_ref_038","doi-asserted-by":"crossref","first-page":"3968","DOI":"10.1109\/JSYST.2019.2896132","article-title":"An identity-based authenticated key exchange protocol resilient to continuous key leakage","volume":"13","year":"2019","journal-title":"IEEE Systems Journal"},{"issue":"2","key":"2024031410105664295_j_infor546_ref_039","doi-asserted-by":"crossref","first-page":"2674","DOI":"10.1109\/JSYST.2022.3204902","article-title":"Leakage-resilient anonymous multi-receiver certificateless encryption resistant to side-channel attacks","volume":"17","year":"2023","journal-title":"IEEE Systems Journal"},{"issue":"7","key":"2024031410105664295_j_infor546_ref_040","doi-asserted-by":"crossref","first-page":"1442","DOI":"10.1109\/TIFS.2015.2414399","article-title":"Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks","volume":"10","year":"2015","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"21","key":"2024031410105664295_j_infor546_ref_041","doi-asserted-by":"crossref","first-page":"16142","DOI":"10.1109\/JIOT.2020.3008955","article-title":"Heterogeneous signcryption with equality test for IIoT environment","volume":"8","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"issue":"2","key":"2024031410105664295_j_infor546_ref_042","doi-asserted-by":"crossref","first-page":"2391","DOI":"10.1109\/JSYST.2020.3048972","article-title":"Heterogeneous signcryption scheme from IBC to PKI with equality test for WBANs","volume":"16","year":"2022","journal-title":"IEEE Systems Journal"},{"key":"2024031410105664295_j_infor546_ref_043","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/BFb0052234","volume-title":"Advances in Cryptology \u2013 CRYPTO \u201997","volume":"1294","year":"1997"}],"container-title":["Informatica"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/informatica.vu.lt\/journal\/INFORMATICA\/article\/1322\/text","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/informatica.vu.lt\/journal\/INFORMATICA\/article\/1322\/text","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T09:59:26Z","timestamp":1710410366000},"score":1,"resource":{"primary":{"URL":"https:\/\/informatica.vu.lt\/doi\/10.15388\/24-INFOR546"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":43,"alternative-id":["10.15388\/24-INFOR546"],"URL":"https:\/\/doi.org\/10.15388\/24-infor546","relation":{},"ISSN":["0868-4952","1822-8844"],"issn-type":[{"value":"0868-4952","type":"print"},{"value":"1822-8844","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}