Identity Based Generalized Signcryption Scheme in the Standard Model

Generalized signcryption (GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm. It is more suitable for the storage constrained setting. In this paper, motivated by Paterson–Schuldt’s scheme, based on bilinear pairing, we first proposed an identity based generalized signcryption (IDGSC) scheme in the standard model. To the best of our knowledge, it is the first scheme that is proven secure in the standard model.

[1]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[2]  John Linn,et al.  Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures , 1987, RFC.

[3]  Mihir Bellare,et al.  The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.

[4]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[5]  Robert H. Deng,et al.  A Signcryption Scheme with Signature Directly Verifiable by Public Key , 1998, Public Key Cryptography.

[6]  Hideki Imai,et al.  How to Construct Efficient Signcryption Schemes on Elliptic Curves , 1998, Inf. Process. Lett..

[7]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[8]  John Malone-Lee,et al.  Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..

[9]  Siu-Ming Yiu,et al.  Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity , 2003, ICISC.

[10]  Xavier Boyen,et al.  Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.

[11]  Wenbo Mao,et al.  Two Birds One Stone: Signcryption Using RSA , 2003, CT-RSA.

[12]  Jean-Jacques Quisquater,et al.  A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[13]  Ran Canetti,et al.  The random oracle methodology, revisited , 2000, JACM.

[14]  Jonathan Katz,et al.  Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..

[15]  Liqun Chen,et al.  Improved Identity-Based Signcryption , 2005, Public Key Cryptography.

[16]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[17]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[18]  Xiaoyuan Yang,et al.  ECGSC: Elliptic Curve based Generalized Signcryption Scheme , 2006, IACR Cryptol. ePrint Arch..

[19]  Kenneth G. Paterson,et al.  Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.

[20]  Xu An Wang,et al.  Provable Secure Generalized Signcryption , 2007, IACR Cryptol. ePrint Arch..

[21]  Sunder Lal,et al.  ID based generalized signcryption , 2008, IACR Cryptol. ePrint Arch..

[22]  Yong Yu,et al.  Identity based signcryption scheme without random oracles , 2009, Comput. Stand. Interfaces.

[23]  C. Pandu Rangan,et al.  Identity Based Public Verifiable Signcryption Scheme , 2010, ProvSec.

[24]  Gang Yu,et al.  Provable secure identity based generalized signcryption scheme , 2010, Theor. Comput. Sci..

[25]  Qiaoyan Wen,et al.  An improved semantically-secure identity-based signcryption scheme in the standard model , 2010, Comput. Electr. Eng..

[26]  Sunder Lal,et al.  An efficient identity based generalized signcryption scheme , 2011, Theor. Comput. Sci..

[27]  Fahad Bin Muhaya,et al.  Efficient Identity-Based Signcryption in the Standard Model , 2011, ProvSec.