Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model

Abstract Identity-based signcryption (IBSC) is a cryptographic primitive which combines both the functions of identity-based signature and identity-based encryption in a single logical step, but with the cost of computation and communication significantly less than those needed by the signature-then-encryption approach. The first proposal Yu et al. (2009)  [12] for IBSC schemes without random oracles and its improvement Zhang (2010)  [15] were found insecure. Recently Li and Takagi (2011)  [16] presented an improved IBSC, but at the price of large signcryptext expansion and more exponentiation computation. In this paper we reconsider the first (but insecure) IBSC proposal, and find that a small modification will result in a secure IBSC. Unlike that of Li and Takagi, our scheme does not sacrifice the bandwidth and computation efficiency to achieve the security goals. We use the proof techniques of Li and Takagi to prove in the standard model its indistinguishability against adaptive chosen ciphertext attack and existential unforgeability against adaptive chosen message attack. Through comparison of computational cost and communication overhead, our scheme is amongst the most efficient IBSC schemes without random oracles.

[1]  Krste Asanovic,et al.  Energy Aware Lossless Data Compression , 2003, MobiSys.

[2]  Kenneth G. Paterson,et al.  Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.

[3]  Xavier Boyen,et al.  Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.

[4]  Qiaoyan Wen,et al.  An improved semantically-secure identity-based signcryption scheme in the standard model , 2010, Comput. Electr. Eng..

[5]  Bo Zhang,et al.  Cryptanalysis of an Identity Based Signcryption Scheme without Random Oracles , 2010 .

[6]  Ron Steinfeld,et al.  A Signcryption Scheme Based on Integer Factorization , 2000, ISW.

[7]  Pil Joong Lee,et al.  New Signcryption Schemes Based on KCDSA , 2001, ICISC.

[8]  Xing Wang,et al.  Attacks against Two Identity-Based Signcryption Schemes , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.

[9]  Fagen Li,et al.  Secure identity-based signcryption in the standard model , 2013, Math. Comput. Model..

[10]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[11]  Yong Yu,et al.  Identity based signcryption scheme without random oracles , 2009, Comput. Stand. Interfaces.

[12]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[13]  Jean-Jacques Quisquater,et al.  A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[14]  Ran Canetti,et al.  The random oracle methodology, revisited , 2000, JACM.

[15]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[16]  Liqun Chen,et al.  Improved Identity-Based Signcryption , 2005, Public Key Cryptography.

[17]  Hideki Imai,et al.  How to Construct Efficient Signcryption Schemes on Elliptic Curves , 1998, Inf. Process. Lett..