A Practical Identity-based Signcryption Scheme

نویسندگان

  • Huiyan Chen
  • Yong Li
  • Jinping Ren
چکیده

In this paper, we construct a new identity-based signcryption scheme from bilinear pairings, which can process arbitrary length plaintexts. The scheme produces shorter ciphertext than the Libert-Quisquater signcryption scheme for the same plaintext and adapts to the bandwidth-constrained scenario very well. It is proved secure against adaptive chosen ciphertext and identity attack based on a variant of the Bilinear Diffie-Hellman problem in the random oracle model.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Online/Offline Identity-Based Signcryption Revisited

In this paper, we redefine a cryptographic notion called Online/Offline Identity-Based Signcryption. It is an “online/offline” version of identity-based signcryption, where most of the computations are carried out offline while the online part does not require any heavy computations such as pairings or multiplications on elliptic curve. It is particularly suitable for power-constrained devices ...

متن کامل

Provable secure identity based generalized signcryption scheme

According to actual needs, generalized signcryption scheme can flexibly work as an encryption scheme, a signature scheme or a signcryption scheme. In this paper, firstly, we give a security model for identity based generalized signcryption which is more complete than existing model. Secondly, we propose an identity based generalized signcryption scheme. Thirdly, we give the security proof of th...

متن کامل

Generalized Hierarchical Identity-Based Signcryption

In this paper, we propose a generic method to construct Hierarchical Identity-Based Signcryption scheme. Using this method, a Hierarchical Identity-Based Signcryption scheme can be converted from any Hierarchical Identity-Based Encryption scheme. Then, we give a concrete instantiation, which is the first constant-size fully secure hierarchical identity-based signcryption scheme in the standard ...

متن کامل

A Computational Review of Identity-based Signcryption Schemes

Since 2002, several identity based signcryption schemes have been proposed. The purpose of designing a signcryption scheme is to perform signature and encryption both in one step but at lesser cost than performing signature and then encryption separately. In this paper, we present a literature survey on signcryption schemes for identity based setup. Our primary focus is on the schemes recently ...

متن کامل

Cryptanalysis of an Identity Based Signcryption Scheme without Random Oracles

Signcryption is a cryptographic primitive that aims at providing confidentiality and the sender’s identity authentication in a logic step, at lower computational costs and communication overheads than sign-then-encrypt way. Recently, Yu et al.[1] proposed a new identity based signcryption scheme in standard model. However, in this paper, we show that the scheme still has some security weaknesse...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 15  شماره 

صفحات  -

تاریخ انتشار 2013