Efficient and identity-based signcryption with provably-secure

被引:0
|
作者
Wen, Yiling [1 ]
Ma, Jianfeng [1 ]
Moon, Sangjae [2 ]
机构
[1] Key Laboratory of Computer Networks and Information Security of Ministry of Education, Xidian University, Xi'an, China
[2] Mobile Network Security Technology Research Center Kyungpook National University, Daegu 702-701, Korea, Republic of
关键词
D O I
10.4156/jdcta.vol4.issue7.14
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The idea of signcryption is to provide a method to encrypt and sign data together, so it is more efficient than using an encryption scheme combined with a signature scheme. We present an identity-based signcryption solution, which is one of the most efficient, provably-secure schemes proposed to date. Our scheme admits provable security in the random oracle model under the bilinear Diffie-Hellman assumption using the definitions proposed by Boyen and it is also forward secure.
引用
收藏
页码:148 / 153
相关论文
共 50 条
  • [1] An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs
    Jin, Zhengping
    Zuo, Huijuan
    Du, Hongzhen
    Wen, Qiaoyan
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2008, : 189 - 193
  • [2] Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
    Barreto, PSLM
    Libert, B
    McCullagh, N
    Quisquater, JJ
    [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 515 - 532
  • [3] Efficient and provably secure multi-receiver identity-based signcryption
    Duan, Shanshan
    Cao, Zhenfu
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 195 - 206
  • [4] Provably Secure and Efficient Multi-Receiver Identity-Based Generalized Signcryption Scheme
    Zhou, Caixue
    [J]. 2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 82 - 88
  • [5] MIDSCYK: An Efficient Provably Secure Multi-Recipient Identity-Based Signcryption Scheme
    Elkamchouchi, Hassan
    Abouelseoud, Yasmine
    [J]. ICNM: 2009 INTERNATIONAL CONFERENCE ON NETWORKING & MEDIA CONVERGENCE, 2007, : 70 - 75
  • [6] Provably secure identity-based aggregate signcryption scheme in random oracles
    Kar, Jayaprakash
    [J]. International Journal of Network Security, 2015, 17 (05) : 580 - 587
  • [7] An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network
    Wu, Libing
    Wang, Jing
    Choo, Kim-Kwang Raymond
    Li, Yuangang
    He, Debiao
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 37 : 112 - 121
  • [8] An efficient and provable secure identity-based ring signcryption scheme
    Zhu, ZhenChao
    Zhang, Yuqing
    Wang, Fengjiao
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1092 - 1097
  • [9] A provably secure multi-receiver identity-based signcryption using bilinear maps
    Narayan, Shivaramakrishnan
    Udaya, Parampalli
    [J]. SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 305 - 308
  • [10] Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments
    Karati, Arijit
    Islam, S. K. Hafizul
    Biswas, G. P.
    Bhuiyan, Md Zakirul Alam
    Vijayakumar, Pandi
    Karuppiah, Marimuthu
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 2904 - 2914