Efficient Identity-Based Signcryption in the Standard Model

被引:0
作者
Li, Fagen [1 ,2 ]
Bin Muhaya, Fahad [3 ]
Zhang, Mingwu [2 ]
Takagi, Tsuyoshi [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Kyushu Univ, Inst Math Industry, Fukuoka 8190395, Japan
[3] King Saud Univ, Prince Muqrin Chair IT Secur, Riyadh, Saudi Arabia
来源
PROVABLE SECURITY | 2011年 / 6980卷
基金
中国国家自然科学基金;
关键词
Identity-based cryptography; signcryption; standard model; SCHEME; SECURE; ENCRYPTION; SIGNATURES;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. Signcryption has been shown to be useful in many applications, such as electronic commerce, mobile communications and smart cards. Recently, three identity-based signcryption schemes in the standard model were proposed. However, the three schemes are broken soon. How to construct a secure identity-based signcryption scheme in the standard model is still an open problem. In this paper, we solve this problem and propose an efficient identity-based signcryption scheme in the standard model. We prove that our scheme has the indistinguishability against adaptive chosen ciphertext attacks under the modified decisional bilinear Diffie-Hellman assumption and the existential unforgeability against adaptive chosen messages attacks under the computational Diffie-Hellman assumption.
引用
收藏
页码:120 / +
页数:4
相关论文
共 29 条
[1]  
[Anonymous], 2010, J COMPUT INF SYST
[2]  
[Anonymous], 1993, CCS 93 P 1 ACM C COM, DOI DOI 10.1145/168588.168596
[3]  
[Anonymous], 2004, IACR CRYPTOL EPRINT
[4]  
[Anonymous], LNCS
[5]  
[Anonymous], 1998, LECT NOTES COMPUTER
[6]  
[Anonymous], 2001, LNCS
[7]   Formal proofs for the security of signcryption [J].
Baek, Joonsang ;
Steinfeld, Ron ;
Zheng, Yuliang .
JOURNAL OF CRYPTOLOGY, 2007, 20 (02) :203-235
[8]  
Barreto PSLM, 2005, LECT NOTES COMPUT SC, V3788, P515
[9]  
Bellare M, 2004, LECT NOTES COMPUT SC, V3027, P171
[10]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615