Efficient Identity-Based Signcryption in the Standard Model

作者: Fagen Li , Fahad Bin Muhaya , Mingwu Zhang , Tsuyoshi Takagi

DOI: 10.1007/978-3-642-24316-5_10

关键词:

摘要: Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at cost significantly lower than required by traditional signature-then-encryption approach. has been shown to be useful in many applications, such as electronic commerce, mobile communications smart cards. Recently, three identity-based signcryption schemes standard model were proposed. However, are broken soon. How construct secure scheme still an open problem. In this paper, we solve problem propose efficient model. We prove our indistinguishability against adaptive chosen ciphertext attacks under modified decisional bilinear Diffie-Hellman assumption existential unforgeability messages computational assumption.

参考文章(35)
Liqun Chen, John Malone-Lee, Improved Identity-Based Signcryption Public Key Cryptography - PKC 2005. pp. 362- 379 ,(2005) , 10.1007/978-3-540-30580-4_25
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan, Identity based public verifiable signcryption scheme provable security. pp. 244- 260 ,(2010) , 10.1007/978-3-642-16280-0_17
Ron Steinfeld, Yuliang Zheng, A Signcryption Scheme Based on Integer Factorization Lecture Notes in Computer Science. pp. 308- 322 ,(2000) , 10.1007/3-540-44456-4_23
John Malone-Lee, Wenbo Mao, Two Birds One Stone: Signcryption Using RSA Topics in Cryptology — CT-RSA 2003. pp. 211- 226 ,(2003) , 10.1007/3-540-36563-X_14
Mihir Bellare, Alexandra Boldyreva, Adriana Palacio, An uninstantiable random-oracle-model scheme for a hybrid-encryption problem theory and application of cryptographic techniques. pp. 171- 188 ,(2004) , 10.1007/978-3-540-24676-3_11
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5
Feng Bao, Robert H Deng, None, A signcryption scheme with signature directly verifiable by public key Public Key Cryptography. pp. 55- 59 ,(1998) , 10.1007/BFB0054014
Amos Fiat, Adi Shamir, How to prove yourself: practical solutions to identification and signature problems international cryptology conference. ,vol. 263, pp. 186- 194 ,(1987) , 10.1007/3-540-47721-7_12
Brent Waters, Efficient identity-based encryption without random oracles theory and application of cryptographic techniques. ,vol. 3494, pp. 114- 127 ,(2005) , 10.1007/11426639_7