A New Identity Based Signcryption Scheme in the Standard Model

Signcryption is a useful cryptographic primitive which simultaneously performs encryption and signature with cost less than the signature-then-encryption approach. Identity-based signcryption (IBSC) eliminates the complicated management of certificates in signcryption schemes in the traditional public-key infrastructure (PKI) setting. Most IBSC schemes are constructed in the random oracle model, while it is unknown how to instantiate a really "random" oracle in the real world. By exploiting Boneh et al.'s strongly unforgeable signature and Paterson et al.'s identity-based signature, this paper proposes a new IBSC scheme in the standard model. It is proven that our IBSC scheme satisfies semantic security and strong unforgeability under the bilinear decision Diffie-Hellman (BDDH) assumption. The proofs do not rely on random oracles. Performance analysis shows that our scheme is also efficient and practical.

[1]  Ron Steinfeld,et al.  How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature , 2007, CT-RSA.

[2]  Josep Domingo-Ferrer,et al.  Bridging Broadcast Encryption and Group Key Agreement , 2011, ASIACRYPT.

[3]  Yupu Hu,et al.  Certificateless signcryption scheme in the standard model , 2010, Inf. Sci..

[4]  Kenneth G. Paterson,et al.  Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.

[5]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[6]  Jean-Jacques Quisquater,et al.  A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[7]  Ran Canetti,et al.  The random oracle methodology, revisited , 2000, JACM.

[8]  Liqun Chen,et al.  Improved Identity-Based Signcryption , 2005, Public Key Cryptography.

[9]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[10]  Siu-Ming Yiu,et al.  Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity , 2003, ICISC.

[11]  Xavier Boyen,et al.  Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.

[12]  Mihir Bellare,et al.  Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles , 2007, Public Key Cryptography.

[13]  Yi Mu,et al.  Asymmetric Group Key Agreement , 2009, EUROCRYPT.

[14]  Bo Zhang,et al.  An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model , 2010, AST/UCMA/ISA/ACN.

[15]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[16]  Yong Yu,et al.  Identity based signcryption scheme without random oracles , 2009, Comput. Stand. Interfaces.

[17]  Joonsang Baek,et al.  Formal Proofs for the Security of Signcryption , 2002, Journal of Cryptology.

[18]  Qiaoyan Wen,et al.  An improved semantically-secure identity-based signcryption scheme in the standard model , 2010, Comput. Electr. Eng..

[19]  Mingwu Zhang,et al.  Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model , 2010, PAISI.

[20]  Xiaohu Tang,et al.  Signcryption with Non-interactive Non-repudiation without Random Oracles , 2010, Trans. Comput. Sci..

[21]  Hideki Imai,et al.  A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function , 2007, ProvSec.

[22]  Chunguang Ma,et al.  A Secure Ring Signcryption Scheme for Private and Anonymous Communication , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[23]  Tal Rabin,et al.  On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.

[24]  Jin Li,et al.  Generic Transformation from Weakly to Strongly Unforgeable Signatures , 2008, Journal of Computer Science and Technology.

[25]  Brent Waters,et al.  Strongly Unforgeable Signatures Based on Computational Diffie-Hellman , 2006, Public Key Cryptography.

[26]  John Malone-Lee,et al.  Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..