Skip to main content
Log in

Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

To achieve unforgeability and confidentiality simultaneously, signcryption has been introduced with better efficiency than the signature-then-encryption approach in terms of computational costs and communication overheads. Taking the key leakage into account, it is desirable to design identity-based key-insulated signcryption (ID-KI-SC) scheme to reduce the damage caused by the secret key leakage. In this paper, we have shown that all of the existing ID-KI-SC scheme can not offer either the unforgeability property or the indistinguishability property. Furthermore, an improved scheme along with the formal security proof in the standard model has been suggested in this paper. In view of computational cost and communication overhead, our scheme is amongst the most efficient IB-SC schemes secure in the standard model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Baek, J., Steinfeld, R., & Zheng, Y. (2002). Formal proofs for the security of signcryption, Public Key Cryptography-PKC 2002, LNCS 2274, Springer, pp. 80–98.

  2. Bao, F., & Deng, R. H. (1998). A signcryption scheme with signature directly verifiable by public key, Public Key Cryptography-PKC’98, LNCS 1431, Springer, pp. 55–59.

  3. Barreto, P. S. L. M., Libert, B., McCullagh, N., & Quisquater, J. J. (2005). Efficient and provably-secure identity-based signatures and signcrypti on from bilinear maps. Advances in Cryptology-ASIACRYPT 2005, LNCS 3788, Springer, pp. 515–532.

  4. Chen L., & Malone-Lee J. (2005). Improved identity-based signcryption. Public Key Cryptography-PKC 2005, LNCS 3386, Springer, pp. 362–379.

  5. Chen, J., Chen, K., Wang, Y., et al. (2012). Identity-based key-insulated signcryption. Informatica, 23, 27–45.

    MATH  Google Scholar 

  6. Dodis, Y., Katz, J., Xu, S., & Yung, M. (2002). Strong key-insulated public key cryptosystems. Advances in Cryptology-Eurocrypt’ 02, LNCS 2332, Springer, pp. 65–82.

  7. Jung, H. Y., Lee, D. H., Lim, J. I., & Chang, K. S. (2001). Signcryption schemes with forward secrecy. Proceedings of the information security application-WISA 2001, pp. 463–475, Seoul, Korea.

  8. Jin, Z., Wen, Q., & Du, H. (2010). An improved semantically-secure identity-based signcryption scheme in the standard model. Computers and Electrical Engineering, 36, 545–552.

    Article  MATH  Google Scholar 

  9. Li, F., Muhaya, F. B., Zhang, M., & Takagi, T. (2011). Efficient identity-based signcryption in the standard model. 5th International conference on provable security-ProvSec 2011, LNCS 6980, Springer, pp. 120–137.

  10. Li, F., & Takagi, T. (2013). Secure identity-based signcryption in the standard model. Mathematical and Computer Modelling, 57, 2685–2694.

    Article  MathSciNet  MATH  Google Scholar 

  11. Li, X., Qian, H., Weng, J., & Yu, Y. (2013). Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model. Mathematical and Computer Modelling, 57, 503–511.

    Article  MathSciNet  Google Scholar 

  12. Malone-Lee, J. (2002). Identity based signcryption, cryptology ePrint archive. Report 2002/098, 2002. Available from: http://eprint.iacr.org/2002/098

  13. Malone-Lee, J., Mao, W. (2003). Two birds one stone: signcryption using RSA. CT-RSA 2003, LNCS 2612, pp. 211–226, Springer.

  14. Qin, B., Wang, H., Wu, Q., Liu, J., & Domingo-Ferrer, J. (2012). A new identity based signcryption scheme in the standard model. 4th international conference on intelligent networking and collaborative systems, pp. 606–611.

  15. Selvi, S. S. D., Vivek, S. S., Vinayagamurthy, D., & Rangan, C. P. (2011). On the security of id based signcryption schemes. Cryptology ePrint Archive. Report 2011/664, 2011. http://eprint.iacr.org/

  16. Shamir, A. (1984). Identity-based cryptosystems and signature schemes. Advances in Cryptology-CRYPTO’84, LNCS 196, Springer, pp. 47–53.

  17. Shin, J. B., Lee, K., & Shim, K. (2003). New DSA-verifiable signcryption schemes. 5th international conference on information security and cryptology-ICISC 2002, LNCS 2587, Springer, pp. 35–47.

  18. Yum, D. H., & Lee, P. J. (2002). New signcryption schemes based on KCDSA. 4th international conference on information security and cryptology-ICISC 2001, LNCS 2288, Springer, pp. 305–317.

  19. Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature & encryption) \(\ll \) cost (signature) + cost(encryption). Advances in Cryptology-CRYPTO’97, LNCS 1294, Springer, pp. 165–179.

  20. Zheng, Y., & Imai, H. (1998). How to construct efficient signcryption schemes on elliptic curves. Information Processing Letters, 68, 227–233.

    Article  MathSciNet  Google Scholar 

  21. Zhu, G., Xiong, H., Wang, R., & Qin, Z. (2014). An improvement of an identity-based Key-insulated signcryption. Proceedings of international conference on computer science and information technology advances in intelligent systems and computing, Vol. 255, pp. 97–104.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guobin Zhu.

Additional information

Part of this submission has been presented in [21]. This work is partially supported by National Natural Science Foundation of China under Grant Nos. 61003230 and 61370026, Open funds from the Chongqing Key Lab of Computer Network and Communication Technology (Grant No. CY-CNCL-2012-02), the Applied Basic Research Program of Sichuan Province (2014JY0041), the Fundamental Research Funds for the Central Universities (Grant No. ZYGX2013J073), the national key scientific and technological special project of China under Grant No. 2011ZX03002-002-03.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhu, G., Xiong, H. & Qin, Z. Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model. Wireless Pers Commun 79, 1401–1416 (2014). https://doi.org/10.1007/s11277-014-1936-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-014-1936-3

Keywords

Navigation