An Efficient ID-Based Proxy Signcryption Scheme

Signcryption is a cryptographic primitive that performs encryption and signature in a single logical step, at lower computational cost and communication over heads than the signature-then-encryption. Proxy signcryption schemes are variations of ordinary signcryption schemes and have been useful in many applications where the delegation of rights is quite common. By combining the functionalities of proxy signature scheme and signcryption scheme, in this paper, we proposed a new ID-based proxy signcryption scheme which offers both public verifiability and forward security. The security requirements and performance of the proposed scheme are analyzed.

[1]  Muhammad Khurram Khan,et al.  A Survey of Identity-based Signcryption , 2011 .

[2]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[3]  Kefei Chen,et al.  Identity based proxy-signcryption scheme from pairings , 2004, IEEE International Conference onServices Computing, 2004. (SCC 2004). Proceedings. 2004.

[4]  C. Pandu Rangan,et al.  Identity Based Public Verifiable Signcryption Scheme , 2010, ProvSec.

[5]  Jussipekka Leiwo,et al.  An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption , 1998 .

[6]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.

[7]  Sunder Lal,et al.  Efficient Identity Based Public Verifiable Signcryption Scheme , 2011, ArXiv.

[8]  Meng Wang,et al.  Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability , 2005, ICCNMC.

[9]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[10]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[11]  John Malone-Lee,et al.  Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..

[12]  Siu-Ming Yiu,et al.  Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity , 2003, ICISC.

[13]  Byoungcheon Lee,et al.  Strong Proxy Signature and its Applications , 2000 .

[14]  Kwangjo Kim,et al.  Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.

[15]  Ashutosh Saxena,et al.  A Survey on ID-Based Cryptographic Primitives , 2005, IACR Cryptol. ePrint Arch..

[16]  Paulo S. L. M. Barreto,et al.  Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.

[17]  Zhenfu Cao,et al.  Two Proxy Signcryption Schemes from Bilinear Pairings , 2005, CANS.

[18]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[19]  Joonsang Baek,et al.  A Survey of Identity-Based Cryptography , 2004 .

[20]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[21]  Jean-Jacques Quisquater,et al.  A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[22]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[23]  Liqun Chen,et al.  Improved Identity-Based Signcryption , 2005, Public Key Cryptography.