An Identity Based Proxy Signcryption Scheme without Pairings

The identity-based cryptography avoids the storage problem of public key certificate of public key infrastructure. The signcryption mechanism completes both authentication and encryption functions with lower communication cost. The proxy signature allows the proxy signer to sign a message on the behalf of the original signer. In this paper, a new identity based proxy signcryption (IBPS) scheme without pairings is proposed, and it is proved to be secure in the random oracle model. To the best of our knowledge, our scheme is more efficient than previous ones in computation.

[1]  Caixue Zhou,et al.  Identity Based Generalized Proxy Signcryption Scheme , 2016, Inf. Technol. Control..

[2]  Jianhua Chen,et al.  An ID-based proxy signature schemes without bilinear pairings , 2011, Ann. des Télécommunications.

[3]  Min-Shiang Hwang,et al.  Generalization of proxy signature based on elliptic curves , 2004, Comput. Stand. Interfaces.

[4]  Jian Shen,et al.  Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices , 2017, Soft Comput..

[5]  Muhammad Junaid,et al.  A novel proxy blind signcryption scheme based on hyper elliptic curve , 2016, 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD).

[6]  Feng Wang,et al.  Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues , 2016, Int. J. Netw. Secur..

[7]  Junjie Yang,et al.  A Novel Identity-Based Signcryption Scheme in the Standard Model , 2017, Inf..

[8]  Tarunpreet Bhatia,et al.  Cryptanalysis and improvement of certificateless proxy signcryption scheme for e-prescription system in mobile cloud computing , 2017, Annals of Telecommunications.

[9]  Addepalli V. N. Krishna,et al.  Window Method Based Cubic Spline Curve Public Key Cryptography , 2016 .

[10]  Meng Wang,et al.  Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability , 2005, ICCNMC.

[11]  Jussipekka Leiwo,et al.  An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption , 1998 .

[12]  Rajeev Anand Sahu,et al.  A secure anonymous proxy signcryption scheme , 2017, J. Math. Cryptol..

[13]  Kefei Chen,et al.  Identity based proxy-signcryption scheme from pairings , 2004, IEEE International Conference onServices Computing, 2004. (SCC 2004). Proceedings. 2004.

[15]  Wu Jian,et al.  Identity-based proxy signcryption schemes , 2012, 2012 First National Conference for Engineering Sciences (FNCES 2012).

[16]  Min-Shiang Hwang,et al.  A new proxy signature scheme with revocation , 2005, Appl. Math. Comput..

[17]  Han-Yu Lin,et al.  Efficient proxy signcryption scheme with provable CCA and CMA security , 2010, Comput. Math. Appl..

[18]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[19]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[20]  Jia-Lun Tsai,et al.  A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings , 2014, J. Appl. Math..

[21]  Mihir Bellare,et al.  Multi-signatures in the plain public-Key model and a general forking lemma , 2006, CCS '06.

[22]  Min-Shiang Hwang,et al.  Generalization of proxy signature-based on discrete logarithms , 2003, Comput. Secur..

[23]  P. Vasudeva Reddy,et al.  An Efficient ID-Based Proxy Signcryption Scheme , 2012 .

[24]  Peeter Laud,et al.  Strong Forward Security in Identity-Based Signcryption , 2013, IACR Cryptol. ePrint Arch..

[25]  Xiaoming Hu,et al.  Short and provably secure designated verifier proxy signature scheme , 2016, IET Inf. Secur..

[26]  Jean-Jacques Quisquater,et al.  A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[27]  Yue Zhang,et al.  A Provable Secure Identity-based Generalized Proxy Signcryption Scheme , 2018, Int. J. Netw. Secur..

[28]  Lunzhi Deng,et al.  Identity Based Proxy Signature from RSA without Pairings , 2017, Int. J. Netw. Secur..

[29]  G. P. Biswas,et al.  A practical identity based signcryption scheme from bilinear pairing , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).