Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model

To achieve unforgeability and confidentiality simultaneously, signcryption has been introduced with better efficiency than the signature-then-encryption approach in terms of computational costs and communication overheads. Taking the key leakage into account, it is desirable to design identity-based key-insulated signcryption (ID-KI-SC) scheme to reduce the damage caused by the secret key leakage. In this paper, we have shown that all of the existing ID-KI-SC scheme can not offer either the unforgeability property or the indistinguishability property. Furthermore, an improved scheme along with the formal security proof in the standard model has been suggested in this paper. In view of computational cost and communication overhead, our scheme is amongst the most efficient IB-SC schemes secure in the standard model.

[1]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[2]  Liqun Chen,et al.  Improved Identity-Based Signcryption , 2005, Public Key Cryptography.

[3]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[4]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[5]  Fagen Li,et al.  Secure identity-based signcryption in the standard model , 2013, Math. Comput. Model..

[6]  Fahad Bin Muhaya,et al.  Efficient Identity-Based Signcryption in the Standard Model , 2011, ProvSec.

[7]  Robert H. Deng,et al.  A Signcryption Scheme with Signature Directly Verifiable by Public Key , 1998, Public Key Cryptography.

[8]  Wenbo Mao,et al.  Two Birds One Stone: Signcryption Using RSA , 2003, CT-RSA.

[9]  C. Pandu Rangan,et al.  On the Security of ID Based Signcryption Schemes , 2011, IACR Cryptol. ePrint Arch..

[10]  Kyung-Ah Shim,et al.  New DSA-Verifiable Signcryption Schemes , 2002, ICISC.

[11]  Hideki Imai,et al.  How to Construct Efficient Signcryption Schemes on Elliptic Curves , 1998, Inf. Process. Lett..

[12]  Jian Weng,et al.  Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model , 2013, Math. Comput. Model..

[13]  Joonsang Baek,et al.  Formal Proofs for the Security of Signcryption , 2002, Public Key Cryptography.

[14]  Josep Domingo-Ferrer,et al.  A New Identity Based Signcryption Scheme in the Standard Model , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.

[15]  Kefei Chen,et al.  Identity-Based Key-Insulated Signcryption , 2012, Informatica.

[16]  Pil Joong Lee,et al.  New Signcryption Schemes Based on KCDSA , 2001, ICISC.

[17]  Zhiguang Qin,et al.  An Improvement of an Identity-Based Key-insulated Signcryption , 2014 .

[18]  Qiaoyan Wen,et al.  An improved semantically-secure identity-based signcryption scheme in the standard model , 2010, Comput. Electr. Eng..

[19]  Shouhuai Xu,et al.  Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.