Abstract
Signcryption is a novel cryptographic primitive that simultaneously provides the authentication and encryption in a single logic step. To adapt multi-receiver setting, motivated by Waters’ identity based encryption scheme, the first multi-receiver identity-based signcryption scheme in the standard model was proposed. Then we prove its semantic security under the assumption of Decisional Bilinear Diffie-Hellman and its unforgeability under the hardness of Computational Diffie-Hellman Problem.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Zheng, Y.: Digital Signcryption or How to Achieve Cost (Signature & Encryption) < < Cost(Signature) + Cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)
Malone-Lee, J.: Identity based signcryption., http://eprint.iacr.org/2002/098
Libert, B., Quisquator, J.J.: A new identity based signcryption scheme from pairings. In: Proceedings of ITW 2003, pp. 155–158. Elsevier, Paris (2003)
Chow, S.S.M., Yiu, S.M., Hui, L.C.K., et al.: Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 352–369. Springer, Heidelberg (2004)
Boyen, X.: Multipurpose Identity-Based Signcryption. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 383–399. Springer, Heidelberg (2003)
Chen, L., Malone-Lee, J.: Improved identity-based signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 362–379. Springer, Heidelberg (2005)
Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515–532. Springer, Heidelberg (2005)
Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005)
Yu, Y., Yang, B., Sun, Y., et al.: Identity based signcryption scheme without random oracles. Computer Standards and Interfaces 31, 56–62 (2009)
Jin, Z., Wen, Q., Du, H.: An improved semantically-secure identity-based signcryption scheme in the standard model. Computers and Electrical Engineering 36, 545–552 (2010)
Duan, S., Cao, Z.: Efficient and provably secure multi-receiver identity-based signcryption. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 195–206. Springer, Heidelberg (2006)
Tan, C.H.: On the security of provably secure multi-receiver ID-based signcryption scheme. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E91-A(7), 1836–1838 (2008)
Yu, Y., Yang, B., Huang, X., Zhang, M.: Efficient identity-based signcryption scheme for multiple receivers. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 13–21. Springer, Heidelberg (2007)
Sharmila Deva Selvi, S., Sree Vivek, S., Gopalakrishnan, R., et al.: Cryptanalysis of ID-based signcryption scheme for multiple receivers, http://eprint.iacr.org/2009/238
Li, F., Hu, X., Nie, X.: A new multi-receiver ID-based signcryption scheme for group communications. In: Proceedings of International Conference on Communications, Circuits and Systems, pp. 296–300. IEEE CS (2009)
Sharmila Deva Selvi, S., Sree Vivek, S., Srinivasan, R., Pandu Rangan, C.: An Efficient Identity-Based Signcryption Scheme for Multiple Receivers. In: Takagi, T., Mambo, M. (eds.) IWSEC 2009. LNCS, vol. 5824, pp. 71–88. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ming, Y., Zhao, X., Wang, Y. (2011). Multi-receiver Identity-Based Signcryption Scheme in the Standard Model. In: Liu, B., Chai, C. (eds) Information Computing and Applications. ICICA 2011. Lecture Notes in Computer Science, vol 7030. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25255-6_62
Download citation
DOI: https://doi.org/10.1007/978-3-642-25255-6_62
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25254-9
Online ISBN: 978-3-642-25255-6
eBook Packages: Computer ScienceComputer Science (R0)