Identity-based signcryption without random oracles

被引:0
|
作者
Narayan, Shivaramakrishnan [1 ]
Udaya, Parampalli [1 ]
Lee, Peter Hyun-Jeen [1 ]
机构
[1] Univ Melbourne, Dept Comp Sci & Software Engn, Melbourne, Vic 3010, Australia
关键词
identity based cryptography; bilinear maps; signcryption; standard model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The use of signcryption for secure and authenticated data communication was realized in 1997, following which numerous signcryptions have been presented which are provably secure in the random oracle proof methodology. In this paper, we present an identity-based signcryption provably secure in the standard model. Our scheme relies on the intractability of two well studied problems, the decisional bilinear Diffie-Hellman and the computational Diffie-Hellman. We achieve the security reduction of our scheme for the properties message confidentiality and unforgeability without relying on random oracles.
引用
收藏
页码:342 / 347
页数:6
相关论文
共 50 条
  • [21] Identity-based Verifiably Committed Signature Scheme without Random Oracles
    孙迅
    李建华
    陈恭亮
    Journal of Shanghai Jiaotong University, 2008, (01) : 110 - 115
  • [22] Identity-based verifiably committed signature scheme without random oracles
    Xun Sun
    Jian-hua Li
    Gong-liang Chen
    Journal of Shanghai Jiaotong University (Science), 2008, 13 (1) : 110 - 115
  • [23] Identity-Based Encryption Resilient to Continual Leakage Without Random Oracles
    Guo, Yuyan
    Jiang, Mingming
    Wei, Shimin
    Xie, Ming
    Sun, Mei
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 53 - 64
  • [24] Fully anonymous identity-based broadcast encryption without random oracles
    Ren, Y. (ryl1982@shu.edu.cn), 1600, Femto Technique Co., Ltd. (16):
  • [25] Mutative identity-based signatures or dynamic credentials without random oracles
    Guo, Fuchun
    Mu, Yi
    Chen, Zhide
    CRYPTOLOGY AND NETWORK SECURITY, 2007, 4856 : 1 - +
  • [26] New Constructions of Identity-based Broadcast Encryption without Random Oracles
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (02): : 428 - 439
  • [27] Efficient Anonymous Identity-Based Broadcast Encryption without Random Oracles
    Xie Li
    Ren Yanli
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (02) : 40 - 51
  • [28] Identity-based key-insulated signature without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Ma, Changshe
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 470 - +
  • [29] Identity-based proxy re-encryption without random oracles
    Chu, Cheng-Kang
    Tzeng, Wen-Guey
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 189 - +