Efficient signcryption in the standard model

被引:4
|
作者
Li, Fagen [1 ,2 ,3 ]
Zhang, Mingwu [3 ]
Takagi, Tsuyoshi [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Chinese Acad Sci, State Key Lab Informat Secur, Grad Sch, Beijing 100049, Peoples R China
[3] Kyushu Univ, Fac Math, Fukuoka 8190395, Japan
基金
中国国家自然科学基金;
关键词
networksecurity; cryptography; signcryption; standard model; bilinearpairing; IDENTITY-BASED ENCRYPTION; SCHEME; SIGNATURES; SECURE;
D O I
10.1002/cpe.1823
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. The performance advantage of signcryption over the signature-then-encryption method makes signcryption useful in many applications, such as electronic commerce, mobile communications, and smart cards. In this paper, we propose an efficient signcryption scheme in the standard model. We prove that our scheme satisfies the confidentiality and strong unforgeability. Compared with the Tan's scheme, our scheme has?|?G?|?+?|?p?|?(320)?bits shorter ciphertext, 2?|?p?|?-?|?G?|?(160) bits shorter private key, and?|?GT?|?+?|?G?|?(1184)?bits shorter public key. In addition, in the Tan's scheme, a user must hold two public key/private key pairs at one time if it were both sender and receiver. Our scheme only needs a public key/private key pair, which is more practical for application. Copyright (c) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:1977 / 1989
页数:13
相关论文
共 50 条
  • [31] Efficient Constructions of Signcryption Schemes and Signcryption Composability
    Matsuda, Takahiro
    Matsuura, Kanta
    Schuldt, Jacob C. N.
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 321 - 342
  • [32] Efficient traceable signatures in the standard model
    Libert, Benoit
    Yung, Moti
    THEORETICAL COMPUTER SCIENCE, 2011, 412 (12-14) : 1220 - 1242
  • [33] Further improvement of an identity-based signcryption scheme in the standard model
    Li, Fagen
    Liao, Yongjian
    Qin, Zhiguang
    Takagi, Tsuyoshi
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (02) : 413 - 421
  • [34] A Survey of Identity-based Signcryption
    Li, Fagen
    Khan, Muhammad Khurram
    IETE TECHNICAL REVIEW, 2011, 28 (03) : 265 - 272
  • [35] Certificateless multi-signcryption scheme in standard model
    Wu, Xuguang
    Zhang, Minqing
    Zhu, Shuaishuai
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2018, 9 (02) : 120 - 127
  • [36] Certificateless Multi-signcryption Scheme in Standard Model
    Wu Xuguang
    Zhang Minqing
    Zhu Shuaishuai
    2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 475 - 479
  • [37] A lightweight identity based generalized signcryption scheme for secure communication in standard model
    Singh T.
    Kumar M.
    Gelmecha D.J.
    Thakur G.K.
    Tyagi V.
    Sori W.J.
    International Journal of Information Technology, 2024, 16 (2) : 1221 - 1229
  • [38] Identity-based aggregate signcryption in the standard model from multilinear maps
    Wang, Hao
    Liu, Zhen
    Liu, Zhe
    Wong, Duncan S.
    FRONTIERS OF COMPUTER SCIENCE, 2016, 10 (04) : 741 - 754
  • [39] Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model
    Zhu, Guobin
    Xiong, Hu
    Qin, Zhiguang
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (02) : 1401 - 1416
  • [40] Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model
    Guobin Zhu
    Hu Xiong
    Zhiguang Qin
    Wireless Personal Communications, 2014, 79 : 1401 - 1416