Identity-Based Proxy Signcryption Protocol with Universal Composability

Proxy signcryption means that the proxy signcrypter obtains the delegate authorization from the original signcrypter and then signcrypts the specified message on behalf of the original signcrypter. In this paper, we construct an identity-based proxy signcryption protocol (IBPSP) based on the universally composable (UC) framework. In the random oracle model, we prove that this protocol has the semantic security under the gap bilinear Diffie-Hellman and computational Diffie-Hellman assumptions. At the same time, an ideal functionality of the identity-based proxy signcryption protocol is defined in the UC security framework, and we also prove the equivalence between the universally composable identity-based proxy signcryption protocol and its IND-CCA2 and UF-CMA security. Analysis shows this IBPSP has both low computation complexity and semantic security together with UC security.

[1]  Kefei Chen,et al.  Identity based proxy-signcryption scheme from pairings , 2004, IEEE International Conference onServices Computing, 2004. (SCC 2004). Proceedings. 2004.

[2]  Jussipekka Leiwo,et al.  An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption , 1998 .

[3]  Tian You Universally Composable Mechanism for Group Communication , 2012 .

[4]  Liu Jiqiang,et al.  A Universally Composable Secure Group Ownership Transfer Protocol for RFID Tags , 2015 .

[5]  Caixue Zhou,et al.  Identity Based Generalized Proxy Signcryption Scheme , 2016, Inf. Technol. Control..

[6]  Chun-I Fan,et al.  Provably secure randomized blind signature scheme based on bilinear pairing , 2010, Comput. Math. Appl..

[7]  Ran Canetti,et al.  Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.

[8]  Li Fang-wei Efficient identity-based proxy signcryption scheme , 2011 .

[9]  Jian-Feng Ma,et al.  Universally Composable Mechanism for Group Communication: Universally Composable Mechanism for Group Communication , 2012 .

[10]  Ran Canetti,et al.  Universally composable signature, certification, and authentication , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..

[11]  Tian You-lian Universally composable secure multiparty computation protocol with fairness , 2014 .

[12]  Wang Yu-min Efficient identity-based proxy signcryption , 2007 .

[13]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[14]  Mingwu Zhang,et al.  Accountable mobile E-commerce scheme in intelligent cloud system transactions , 2018, J. Ambient Intell. Humaniz. Comput..

[15]  Bo Yang,et al.  Low-computation certificateless hybrid signcryption scheme , 2017, Frontiers of Information Technology & Electronic Engineering.