Efficient signcryption in the standard model

被引:4
|
作者
Li, Fagen [1 ,2 ,3 ]
Zhang, Mingwu [3 ]
Takagi, Tsuyoshi [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Chinese Acad Sci, State Key Lab Informat Secur, Grad Sch, Beijing 100049, Peoples R China
[3] Kyushu Univ, Fac Math, Fukuoka 8190395, Japan
来源
基金
中国国家自然科学基金;
关键词
networksecurity; cryptography; signcryption; standard model; bilinearpairing; IDENTITY-BASED ENCRYPTION; SCHEME; SIGNATURES; SECURE;
D O I
10.1002/cpe.1823
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. The performance advantage of signcryption over the signature-then-encryption method makes signcryption useful in many applications, such as electronic commerce, mobile communications, and smart cards. In this paper, we propose an efficient signcryption scheme in the standard model. We prove that our scheme satisfies the confidentiality and strong unforgeability. Compared with the Tan's scheme, our scheme has?|?G?|?+?|?p?|?(320)?bits shorter ciphertext, 2?|?p?|?-?|?G?|?(160) bits shorter private key, and?|?GT?|?+?|?G?|?(1184)?bits shorter public key. In addition, in the Tan's scheme, a user must hold two public key/private key pairs at one time if it were both sender and receiver. Our scheme only needs a public key/private key pair, which is more practical for application. Copyright (c) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:1977 / 1989
页数:13
相关论文
共 50 条
  • [41] Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model
    Zhu, Guobin
    Xiong, Hu
    Qin, Zhiguang
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (02) : 1401 - 1416
  • [42] Efficient Signcryption for Heterogeneous Systems
    Li, Fagen
    Zhang, Hui
    Takagi, Tsuyoshi
    IEEE SYSTEMS JOURNAL, 2013, 7 (03): : 420 - 429
  • [43] Identity-based aggregate signcryption in the standard model from multilinear maps
    Hao WANG
    Zhen LIU
    Zhe LIU
    Duncan SWONG
    Frontiers of Computer Science, 2016, 10 (04) : 741 - 754
  • [44] Efficient Certificateless Signcryption Scheme
    Yu, Gang
    Yang, Hongzhi
    Fan, Shuqin
    YongShen
    Han, Wenbao
    THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 55 - 59
  • [45] New efficient signcryption scheme
    Communications Research Center, Harbin Institute of Technology, Harbin 150001, China
    Nanjing Li Gong Daxue Xuebao, 2006, 6 (739-741+754):
  • [46] Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model
    Guobin Zhu
    Hu Xiong
    Zhiguang Qin
    Wireless Personal Communications, 2014, 79 : 1401 - 1416
  • [47] Identity-based aggregate signcryption in the standard model from multilinear maps
    Hao Wang
    Zhen Liu
    Zhe Liu
    Duncan S. Wong
    Frontiers of Computer Science, 2016, 10 : 741 - 754
  • [48] A New Efficient Blind Signcryption
    YU Xiuying
    WuhanUniversityJournalofNaturalSciences, 2008, (06) : 662 - 664
  • [49] Efficient and proactive threshold signcryption
    Ma, CS
    Chen, KF
    Zheng, D
    Liu, SL
    INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 233 - 243
  • [50] An efficient signcryption scheme with key privacy and its extension to ring signcryption
    Li, Chung
    Yang, Guomin
    Wong, Duncan
    Deng, Xiaotie
    Chow, Sherman
    JOURNAL OF COMPUTER SECURITY, 2010, 18 (03) : 451 - 473