Skip to main content
Erschienen in: Wireless Personal Communications 2/2014

01.11.2014

Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model

verfasst von: Guobin Zhu, Hu Xiong, Zhiguang Qin

Erschienen in: Wireless Personal Communications | Ausgabe 2/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

To achieve unforgeability and confidentiality simultaneously, signcryption has been introduced with better efficiency than the signature-then-encryption approach in terms of computational costs and communication overheads. Taking the key leakage into account, it is desirable to design identity-based key-insulated signcryption (ID-KI-SC) scheme to reduce the damage caused by the secret key leakage. In this paper, we have shown that all of the existing ID-KI-SC scheme can not offer either the unforgeability property or the indistinguishability property. Furthermore, an improved scheme along with the formal security proof in the standard model has been suggested in this paper. In view of computational cost and communication overhead, our scheme is amongst the most efficient IB-SC schemes secure in the standard model.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Baek, J., Steinfeld, R., & Zheng, Y. (2002). Formal proofs for the security of signcryption, Public Key Cryptography-PKC 2002, LNCS 2274, Springer, pp. 80–98. Baek, J., Steinfeld, R., & Zheng, Y. (2002). Formal proofs for the security of signcryption, Public Key Cryptography-PKC 2002, LNCS 2274, Springer, pp. 80–98.
2.
Zurück zum Zitat Bao, F., & Deng, R. H. (1998). A signcryption scheme with signature directly verifiable by public key, Public Key Cryptography-PKC’98, LNCS 1431, Springer, pp. 55–59. Bao, F., & Deng, R. H. (1998). A signcryption scheme with signature directly verifiable by public key, Public Key Cryptography-PKC’98, LNCS 1431, Springer, pp. 55–59.
3.
Zurück zum Zitat Barreto, P. S. L. M., Libert, B., McCullagh, N., & Quisquater, J. J. (2005). Efficient and provably-secure identity-based signatures and signcrypti on from bilinear maps. Advances in Cryptology-ASIACRYPT 2005, LNCS 3788, Springer, pp. 515–532. Barreto, P. S. L. M., Libert, B., McCullagh, N., & Quisquater, J. J. (2005). Efficient and provably-secure identity-based signatures and signcrypti on from bilinear maps. Advances in Cryptology-ASIACRYPT 2005, LNCS 3788, Springer, pp. 515–532.
4.
Zurück zum Zitat Chen L., & Malone-Lee J. (2005). Improved identity-based signcryption. Public Key Cryptography-PKC 2005, LNCS 3386, Springer, pp. 362–379. Chen L., & Malone-Lee J. (2005). Improved identity-based signcryption. Public Key Cryptography-PKC 2005, LNCS 3386, Springer, pp. 362–379.
5.
Zurück zum Zitat Chen, J., Chen, K., Wang, Y., et al. (2012). Identity-based key-insulated signcryption. Informatica, 23, 27–45.MATH Chen, J., Chen, K., Wang, Y., et al. (2012). Identity-based key-insulated signcryption. Informatica, 23, 27–45.MATH
6.
Zurück zum Zitat Dodis, Y., Katz, J., Xu, S., & Yung, M. (2002). Strong key-insulated public key cryptosystems. Advances in Cryptology-Eurocrypt’ 02, LNCS 2332, Springer, pp. 65–82. Dodis, Y., Katz, J., Xu, S., & Yung, M. (2002). Strong key-insulated public key cryptosystems. Advances in Cryptology-Eurocrypt’ 02, LNCS 2332, Springer, pp. 65–82.
7.
Zurück zum Zitat Jung, H. Y., Lee, D. H., Lim, J. I., & Chang, K. S. (2001). Signcryption schemes with forward secrecy. Proceedings of the information security application-WISA 2001, pp. 463–475, Seoul, Korea. Jung, H. Y., Lee, D. H., Lim, J. I., & Chang, K. S. (2001). Signcryption schemes with forward secrecy. Proceedings of the information security application-WISA 2001, pp. 463–475, Seoul, Korea.
8.
Zurück zum Zitat Jin, Z., Wen, Q., & Du, H. (2010). An improved semantically-secure identity-based signcryption scheme in the standard model. Computers and Electrical Engineering, 36, 545–552.CrossRefMATH Jin, Z., Wen, Q., & Du, H. (2010). An improved semantically-secure identity-based signcryption scheme in the standard model. Computers and Electrical Engineering, 36, 545–552.CrossRefMATH
9.
Zurück zum Zitat Li, F., Muhaya, F. B., Zhang, M., & Takagi, T. (2011). Efficient identity-based signcryption in the standard model. 5th International conference on provable security-ProvSec 2011, LNCS 6980, Springer, pp. 120–137. Li, F., Muhaya, F. B., Zhang, M., & Takagi, T. (2011). Efficient identity-based signcryption in the standard model. 5th International conference on provable security-ProvSec 2011, LNCS 6980, Springer, pp. 120–137.
10.
Zurück zum Zitat Li, F., & Takagi, T. (2013). Secure identity-based signcryption in the standard model. Mathematical and Computer Modelling, 57, 2685–2694.MathSciNetCrossRefMATH Li, F., & Takagi, T. (2013). Secure identity-based signcryption in the standard model. Mathematical and Computer Modelling, 57, 2685–2694.MathSciNetCrossRefMATH
11.
Zurück zum Zitat Li, X., Qian, H., Weng, J., & Yu, Y. (2013). Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model. Mathematical and Computer Modelling, 57, 503–511.MathSciNetCrossRef Li, X., Qian, H., Weng, J., & Yu, Y. (2013). Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model. Mathematical and Computer Modelling, 57, 503–511.MathSciNetCrossRef
13.
Zurück zum Zitat Malone-Lee, J., Mao, W. (2003). Two birds one stone: signcryption using RSA. CT-RSA 2003, LNCS 2612, pp. 211–226, Springer. Malone-Lee, J., Mao, W. (2003). Two birds one stone: signcryption using RSA. CT-RSA 2003, LNCS 2612, pp. 211–226, Springer.
14.
Zurück zum Zitat Qin, B., Wang, H., Wu, Q., Liu, J., & Domingo-Ferrer, J. (2012). A new identity based signcryption scheme in the standard model. 4th international conference on intelligent networking and collaborative systems, pp. 606–611. Qin, B., Wang, H., Wu, Q., Liu, J., & Domingo-Ferrer, J. (2012). A new identity based signcryption scheme in the standard model. 4th international conference on intelligent networking and collaborative systems, pp. 606–611.
15.
Zurück zum Zitat Selvi, S. S. D., Vivek, S. S., Vinayagamurthy, D., & Rangan, C. P. (2011). On the security of id based signcryption schemes. Cryptology ePrint Archive. Report 2011/664, 2011. http://eprint.iacr.org/ Selvi, S. S. D., Vivek, S. S., Vinayagamurthy, D., & Rangan, C. P. (2011). On the security of id based signcryption schemes. Cryptology ePrint Archive. Report 2011/664, 2011. http://​eprint.​iacr.​org/​
16.
Zurück zum Zitat Shamir, A. (1984). Identity-based cryptosystems and signature schemes. Advances in Cryptology-CRYPTO’84, LNCS 196, Springer, pp. 47–53. Shamir, A. (1984). Identity-based cryptosystems and signature schemes. Advances in Cryptology-CRYPTO’84, LNCS 196, Springer, pp. 47–53.
17.
Zurück zum Zitat Shin, J. B., Lee, K., & Shim, K. (2003). New DSA-verifiable signcryption schemes. 5th international conference on information security and cryptology-ICISC 2002, LNCS 2587, Springer, pp. 35–47. Shin, J. B., Lee, K., & Shim, K. (2003). New DSA-verifiable signcryption schemes. 5th international conference on information security and cryptology-ICISC 2002, LNCS 2587, Springer, pp. 35–47.
18.
Zurück zum Zitat Yum, D. H., & Lee, P. J. (2002). New signcryption schemes based on KCDSA. 4th international conference on information security and cryptology-ICISC 2001, LNCS 2288, Springer, pp. 305–317. Yum, D. H., & Lee, P. J. (2002). New signcryption schemes based on KCDSA. 4th international conference on information security and cryptology-ICISC 2001, LNCS 2288, Springer, pp. 305–317.
19.
Zurück zum Zitat Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature & encryption) \(\ll \) cost (signature) + cost(encryption). Advances in Cryptology-CRYPTO’97, LNCS 1294, Springer, pp. 165–179. Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature & encryption) \(\ll \) cost (signature) + cost(encryption). Advances in Cryptology-CRYPTO’97, LNCS 1294, Springer, pp. 165–179.
20.
Zurück zum Zitat Zheng, Y., & Imai, H. (1998). How to construct efficient signcryption schemes on elliptic curves. Information Processing Letters, 68, 227–233.MathSciNetCrossRef Zheng, Y., & Imai, H. (1998). How to construct efficient signcryption schemes on elliptic curves. Information Processing Letters, 68, 227–233.MathSciNetCrossRef
21.
Zurück zum Zitat Zhu, G., Xiong, H., Wang, R., & Qin, Z. (2014). An improvement of an identity-based Key-insulated signcryption. Proceedings of international conference on computer science and information technology advances in intelligent systems and computing, Vol. 255, pp. 97–104. Zhu, G., Xiong, H., Wang, R., & Qin, Z. (2014). An improvement of an identity-based Key-insulated signcryption. Proceedings of international conference on computer science and information technology advances in intelligent systems and computing, Vol. 255, pp. 97–104.
Metadaten
Titel
Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model
verfasst von
Guobin Zhu
Hu Xiong
Zhiguang Qin
Publikationsdatum
01.11.2014
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2014
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-014-1936-3

Weitere Artikel der Ausgabe 2/2014

Wireless Personal Communications 2/2014 Zur Ausgabe

Neuer Inhalt