Identity Based Generalized Proxy Signcryption Scheme

被引:10
|
作者
Zhou, Cai-Xue [1 ]
机构
[1] Jiujiang Univ, Sch Informat Sci & Technol, Jiujiang 332005, Peoples R China
来源
INFORMATION TECHNOLOGY AND CONTROL | 2016年 / 45卷 / 01期
基金
中国国家自然科学基金;
关键词
combined public key cryptosystem; generalized signcryption; proxy signature; proxy signcryption; bilinear pairing; SIGNATURE SCHEME; SECURE; ENCRYPTION;
D O I
10.5755/j01.itc.45.1.8758
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Generalized signcryption can work as an encryption scheme, a signature scheme or a signcryption scheme with only one key pair and one algorithm. We extend it to the proxy system setting by considering sharing the same key pair and algorithm between the proxy signature and proxy signcryption, and we call it generalized proxy signcryption (GPSC). We give a formal definition and security model of GPSC in the identity-based setting by considering the whole abilities of an attacker, and propose a concrete scheme in the standard model. Our scheme is publicly verifiable, with strong security by considering insider attack, resisting proxy key exposure attack and with short system public parameters. Our scheme can be proved semantically secure against adaptively chosen ciphertext, chosen id and chosen warrant attack (IND-IB-GPSC-CCA for short) under the Decisional Bilinear Diffie-Hellman (DBDH) assumption, and existentially unforgeable against adaptively chosen message, chosen id and chosen warrant attack (EUF-IB-GPSC-CMA for short) under the Computational Diffie-Hellman (CDH) assumption. The performance evaluation shows it to be of high efficiency. Moreover, we give a general construction of identity-based GPSC scheme from an identity-based combined signature and encryption scheme.
引用
收藏
页码:13 / 26
页数:14
相关论文
共 50 条
  • [1] Identity based threshold proxy signcryption scheme
    Wang, M
    Liu, ZJ
    [J]. FIFTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - PROCEEDINGS, 2005, : 695 - 699
  • [2] An identity based proxy signcryption scheme without pairings
    Guo, Hui
    Deng, Lunzhi
    [J]. International Journal of Network Security, 2020, 22 (04) : 561 - 568
  • [3] An efficient identity based generalized signcryption scheme
    Kushwah, Prashant
    Lal, Sunder
    [J]. THEORETICAL COMPUTER SCIENCE, 2011, 412 (45) : 6382 - 6389
  • [4] Identity based proxy-signcryption scheme from pairings
    Li, XX
    Chen, KF
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2004, : 494 - 497
  • [5] Identity Based Generalized Signcryption Scheme in the Standard Model
    Shen, Xiaoqin
    Ming, Yang
    Feng, Jie
    [J]. ENTROPY, 2017, 19 (03)
  • [6] Provable secure identity based generalized signcryption scheme
    Yu, Gang
    Ma, Xiaoxiao
    Shen, Yong
    Han, Wenbao
    [J]. THEORETICAL COMPUTER SCIENCE, 2010, 411 (40-42) : 3614 - 3624
  • [7] A provable secure identity-based threshold proxy signcryption scheme
    [J]. Hu, D. (hdf666@163.com), 2013, CESER Publications, Post Box No. 113, Roorkee, 247667, India (51):
  • [8] Efficient Identity-Based Generalized Ring Signcryption Scheme
    Zhou, Caixue
    Cui, Zongmin
    Gao, Guangyong
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (12): : 5553 - 5571
  • [9] Cryptanalysis of an Authentication Scheme Using an Identity Based Generalized Signcryption
    Waheed, Abdul
    Umar, Arif Iqbal
    Din, Nizamud
    Ul Amin, Noor
    Abdullah, Saleem
    Kumam, Poom
    [J]. MATHEMATICS, 2019, 7 (09)
  • [10] A Secure and Efficient Identity based Proxy Signcryption Scheme for Smart Grid Network
    Patil, Rachana
    Patil, Yogesh H.
    [J]. Journal of Engineering Science and Technology Review, 2022, 15 (04) : 82 - 89