Efficient and identity-based signcryption with provably-secure

被引:0
作者
Wen Y. [1 ]
Ma J. [1 ]
Moon S. [2 ]
机构
[1] Key Laboratory of Computer Networks and Information Security of Ministry of Education, Xidian University, Xi'an
[2] Mobile Network Security Technology Research Center Kyungpook National University
关键词
Forward secure; Identity-based; Provably-secure; Signcryption;
D O I
10.4156/jdcta.vol4.issue7.14
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The idea of signcryption is to provide a method to encrypt and sign data together, so it is more efficient than using an encryption scheme combined with a signature scheme. We present an identity-based signcryption solution, which is one of the most efficient, provably-secure schemes proposed to date. Our scheme admits provable security in the random oracle model under the bilinear Diffie-Hellman assumption using the definitions proposed by Boyen and it is also forward secure.
引用
收藏
页码:148 / 153
相关论文
共 19 条
[1]  
Zheng Y., Digital signcryption or how to achieve cost (signature & encryption << cost (signature) + cost (encryption), Advances In Cryptology-CRYPTO'97, LNCS, 1294, pp. 165-179, (1997)
[2]  
Shamir A., Identity-based cryptosystems and signature schemes, Advances In Cryptology-CRYPTO'84, LNCS, 196, pp. 47-53, (1984)
[3]  
Libert B., Quisquater J., A new identity based signcryption schemes from pairings, In Proceeding of The 2003 IEEE Information Theory Workshop, pp. 155-158, (2003)
[4]  
Nalla D., Reddy K.C., Signcryption Scheme For Identity-based Cryptosystems
[5]  
Sakai R., Kasahara M., Id-based Cryptosystems With Pairing On Elliptic Curve, (2003)
[6]  
Boyen X., Multipurpose identity-based signcryption: A Swiss army knife for identity-based cryptography, Advances In Cryptology-CRYPTO 2003, LNCS, 2729, pp. 383-399, (2003)
[7]  
Chen L., Malone-Lee J., Improved Identity-based Signcryption, (2004)
[8]  
Sherman C.S.M., Yiu S.M., Lucas H.C.K., Et al., Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity, LNCS, 2971, pp. 352-369, (2004)
[9]  
Cuomin Y., Wong S., Deng X., Analysis and Improvement of a Signcryption Scheme with Key Privacy, LNCS, 3650, pp. 218-232, (2005)
[10]  
Chen H., Li Z.H., Chen Q., An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings, LNCS, 4097, pp. 342-351, (2006)