Abstract
The primitive signcryption provides authenticity and privacy simultaneously. In this paper, we present efficient signcryption schemes between the traditional public key cryptosystem (TPKC) and the identity based cryptosystem (IDPKC). In contrast, all the existing signcryption schemes available in the literature, to our knowledge, are limited to within one type of cryptosystem. We also discuss them in the multi-receiver setting. Formal security proofs are provided to guarantee the security for our schemes, in the random oracle model, under the hardness of the bilinear Diffie-Hellman problem.
Similar content being viewed by others
References
Zheng Y. Digital signcryption or how to achieve cost (signature & encryption) ≪ cost(signature) + cost(encryption). In: Proc of Crypto 1997, LNCS Vol. 1294. Berlin: Springer-Verlag, 1997. 165–179
Horster P, Michels M, Petersen H. Authenticated encryption schemes with low communication costs. Electr Lett, 1994, 30: 1212–1213
An J H. Authenticated encryption in the public-key setting: security notions and analysis. Available at http://eprint.iacr.org/2001/079
An J H, Dodis Y, Rabin T. On the security of joint signature and encryption. In: Proc of Eurocrypt 2002, LNCS Vol. 2332. Berlin: Springer-Verlag, 2002. 83–107
Bellare M, Namprempre C. Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In: Proc of Asiacrypt 2000, LNCS 1976. Berlin: Springer-Verlag, 2000. 531–545
Dodis Y, Freedman M J, Jarecki S, et al. Versatile padding schemes for joint signature and encryption. In: 11th ACM Conference on Computer and Communication Security. New York: ACM, 2004
Matsuda T, Matsuura K, Schuldt J C N. Efficient constructions of signcryption schemes and signcryption composability. In: Progress in Cryptology-INDOCRYPT 2009, LNCS Vol. 5922. Berlin: Springer-Verlag, 2009. 321–342
Shamir A. Identity-based cryptosystems and signature schemes. In: Proc of Crypto 1984, LNCS Vol. 196. Berlin: Springer-Verlag, 1984. 47–53
Boneh D, Franklin M. Identity-based encryption from the Weil pairing. In: Proc of CRYPTO 2001, LNCS Vol. 2139. Berlin: Springer-Verlag, 2001. 213–229
Lynn B. Authenticated identity-based encryption. Available at http://eprint.iacr.org/2002/072.
Barreto P S L M, Libert B, McCullagh N, et al. Efficient and provably-secure identity based signatures and signcryption from bilinear maps. In: Pro of Asiacrypt 2005, LNCS Vol. 3788. Berlin: Springer-Verlag, 2005. 515–532
Chen L, Malone-Lee J. Improved identity-based signcryption. In: Proc of PKC 2005, LNCS Vol. 3386. Berlin: Springer-Verlag, 2005. 362–379
Li F, Hu Y, Li G. An efficient identity-based signcryption scheme (In Chinese). Chinese J Comput, 2006, 29: 1641–1647
Li F, Shirase M, Takagi T. Efficient multi-PKG ID-based signcryption for Ad hoc networks. In: Proc of Information Security and Cryptology, LNCS Vol. 5487. Berlin: Springer-Verlag, 2009. 289–304
Bellare M, Boldyreva A, Micali S. Public-key encryption in a multi-user setting: security proofs and improvements. In: Proc of Eurocrypt 2000, LNCS Vol. 1807. Berlin: Springer-Verlag, 2000. 259–274
Kurosawa K. Multi-recipient public-key encryption with shortened ciphertext. In: Proc of PKC 2002, LNCS Vol. 2274. Berlin: Springer-Verlag, 2002. 48–63
Bellare M, Boldyreva A, Staddon J. Randomness re-use in multi-recipient encryption scheme. In: Proc of PKC 2003, LNCS Vol. 2567. Berlin: Springer-Verlag, 2003. 85–99
Baek J, Safavi-Naini R, Susilo W. Efficient Multi-receiver identity-based encryption and its application to broadcast encryption. In: Proc of PKC 2005, LNCS Vol. 3386. Berlin: Springer-Verlag, 2005. 380–397
Zheng Y. Signcryption and its applications in efficient public key solutions. In: Proc of ISW 1997, LNCS Vol. 1396. Berlin: Springer-Verlag, 1997. 291–312
Alt S. Authenticated hybrid encryption for multiple recipients. Available at http://eprint.iacr.org/2006/029
Duan S, Cao Z. Efficient and provably secure multi-receiver identity-based signcryption. In: Proc of ACISP 2006, LNCS Vol. 4058. Berlin: Springer-Verlag, 2006. 195–206
Yu Y, Yang B, Huang X, et al. Efficient identity-based signcryption scheme for multiple receivers. In: Proc of ATC 2007, LNCS Vol. 4610. Berlin: Springer-Verlag, 2007. 13–21
Selvi S S D, Vivek S S, Gopalakrishnan R, et al. Cryptanalysis of ID-based signcryption scheme for multiple receivers. Available at http://eprint.iacr.org/2008/238
Selvi S S D, Vivek S S, Srinivasan R, et al. An efficient identity-based signcryption scheme for multiple receivers. In: Advances in Information and Computer Security 2009, LNCS Vol. 5824. Berlin: Springer-Verlag, 2009. 71–88
Fujisaki E, Okamoto T. Secure integration of asymmetirc and symmetric encryption schemes. In: Proc of Crypto 1999, LNCS Vol. 1666. Berlin: Springer-Verlag, 1999. 537–554
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sun, Y., Li, H. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction. Sci. China Inf. Sci. 53, 557–566 (2010). https://doi.org/10.1007/s11432-010-0061-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11432-010-0061-5