Skip to main content

Multi-receiver Identity-Based Signcryption Scheme in the Standard Model

  • Conference paper
Information Computing and Applications (ICICA 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7030))

Included in the following conference series:

Abstract

Signcryption is a novel cryptographic primitive that simultaneously provides the authentication and encryption in a single logic step. To adapt multi-receiver setting, motivated by Waters’ identity based encryption scheme, the first multi-receiver identity-based signcryption scheme in the standard model was proposed. Then we prove its semantic security under the assumption of Decisional Bilinear Diffie-Hellman and its unforgeability under the hardness of Computational Diffie-Hellman Problem.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  2. Zheng, Y.: Digital Signcryption or How to Achieve Cost (Signature & Encryption) < < Cost(Signature) + Cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  3. Malone-Lee, J.: Identity based signcryption., http://eprint.iacr.org/2002/098

  4. Libert, B., Quisquator, J.J.: A new identity based signcryption scheme from pairings. In: Proceedings of ITW 2003, pp. 155–158. Elsevier, Paris (2003)

    Google Scholar 

  5. Chow, S.S.M., Yiu, S.M., Hui, L.C.K., et al.: Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 352–369. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Boyen, X.: Multipurpose Identity-Based Signcryption. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 383–399. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  7. Chen, L., Malone-Lee, J.: Improved identity-based signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 362–379. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515–532. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Yu, Y., Yang, B., Sun, Y., et al.: Identity based signcryption scheme without random oracles. Computer Standards and Interfaces 31, 56–62 (2009)

    Article  Google Scholar 

  11. Jin, Z., Wen, Q., Du, H.: An improved semantically-secure identity-based signcryption scheme in the standard model. Computers and Electrical Engineering 36, 545–552 (2010)

    Article  MATH  Google Scholar 

  12. Duan, S., Cao, Z.: Efficient and provably secure multi-receiver identity-based signcryption. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 195–206. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Tan, C.H.: On the security of provably secure multi-receiver ID-based signcryption scheme. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E91-A(7), 1836–1838 (2008)

    Article  Google Scholar 

  14. Yu, Y., Yang, B., Huang, X., Zhang, M.: Efficient identity-based signcryption scheme for multiple receivers. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 13–21. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  15. Sharmila Deva Selvi, S., Sree Vivek, S., Gopalakrishnan, R., et al.: Cryptanalysis of ID-based signcryption scheme for multiple receivers, http://eprint.iacr.org/2009/238

  16. Li, F., Hu, X., Nie, X.: A new multi-receiver ID-based signcryption scheme for group communications. In: Proceedings of International Conference on Communications, Circuits and Systems, pp. 296–300. IEEE CS (2009)

    Google Scholar 

  17. Sharmila Deva Selvi, S., Sree Vivek, S., Srinivasan, R., Pandu Rangan, C.: An Efficient Identity-Based Signcryption Scheme for Multiple Receivers. In: Takagi, T., Mambo, M. (eds.) IWSEC 2009. LNCS, vol. 5824, pp. 71–88. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ming, Y., Zhao, X., Wang, Y. (2011). Multi-receiver Identity-Based Signcryption Scheme in the Standard Model. In: Liu, B., Chai, C. (eds) Information Computing and Applications. ICICA 2011. Lecture Notes in Computer Science, vol 7030. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25255-6_62

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25255-6_62

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25254-9

  • Online ISBN: 978-3-642-25255-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics