Efficient identity based multi-proxy multi-signcryption scheme using bilinear pairings over elliptic curves

Signcryption is a cryptographic primitive that performs both encryption and signature in a single logical step more efficiently than sign-then-encryption approach. Till now various kinds of signcryption schemes have been proposed. In this paper we propose a new identity based multi-proxy multi signcryption scheme from bilinear pairings, which is both public verifiable and forward secure. This scheme is a combination of multi-proxy multi-signature scheme with signcryption scheme. We discuss the security requirements of our new scheme. Finally, we compare our scheme with previous schemes in computational point of view.

[1]  A. Shamm Identity-based cryptosystems and signature schemes , 1985 .

[2]  Christian Callegari,et al.  Advances in Computing, Communications and Informatics (ICACCI) , 2015 .

[3]  Ashutosh Saxena,et al.  A Survey on ID-Based Cryptographic Primitives , 2005, IACR Cryptol. ePrint Arch..

[4]  Tej Singh,et al.  New ID Based Multi-Proxy Multi-Signcryption Scheme from Pairings , 2007, ArXiv.

[5]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.

[6]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[7]  Yong Yu,et al.  Identity Based Multi-proxy Multi-signcryption Scheme for Electronic Commerce , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[8]  C. Pandu Rangan,et al.  Identity Based Public Verifiable Signcryption Scheme , 2010, ProvSec.

[9]  Jussipekka Leiwo,et al.  An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption , 1998 .

[10]  Jean-Jacques Quisquater,et al.  A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[11]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[12]  Paulo S. L. M. Barreto,et al.  On the Selection of Pairing-Friendly Groups , 2003, Selected Areas in Cryptography.

[13]  Weiping Zuo,et al.  An ID-Based Proxy Multi-signcryption Scheme from Pairings , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[14]  Pil Joong Lee,et al.  Identity-Based Signcryption from Identity-Based Cryptography , 2011, WISA.

[15]  Siu-Ming Yiu,et al.  Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity , 2003, ICISC.

[16]  Muhammad Khurram Khan,et al.  A Survey of Identity-based Signcryption , 2011 .

[17]  Kyung-Ah Shim An ID-based aggregate signature scheme with constant pairing computations , 2010, J. Syst. Softw..

[18]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[19]  Liqun Chen,et al.  Improved Identity-Based Signcryption , 2005, Public Key Cryptography.

[20]  Wu Yan,et al.  An Improved ID-Based Multi-Proxy Multi-Signcryption Scheme , 2009, 2009 Second International Symposium on Electronic Commerce and Security.

[21]  Sunder Lal,et al.  Efficient Identity Based Public Verifiable Signcryption Scheme , 2011, ArXiv.

[22]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[23]  Guozhen Xiao,et al.  Multi-Proxy Multi-Signcryption Scheme from Pairings , 2005, ArXiv.

[24]  Joonsang Baek,et al.  A Survey of Identity-Based Cryptography , 2004 .

[25]  Xiao Guo-Zhen,et al.  Multi-Proxy Multi-Signcryption Scheme from Pairings , 2005 .

[26]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[27]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .