Skip to main content
Log in

Efficient signcryption between TPKC and IDPKC and its multi-receiver construction

  • Research Papers
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

The primitive signcryption provides authenticity and privacy simultaneously. In this paper, we present efficient signcryption schemes between the traditional public key cryptosystem (TPKC) and the identity based cryptosystem (IDPKC). In contrast, all the existing signcryption schemes available in the literature, to our knowledge, are limited to within one type of cryptosystem. We also discuss them in the multi-receiver setting. Formal security proofs are provided to guarantee the security for our schemes, in the random oracle model, under the hardness of the bilinear Diffie-Hellman problem.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Zheng Y. Digital signcryption or how to achieve cost (signature & encryption) ≪ cost(signature) + cost(encryption). In: Proc of Crypto 1997, LNCS Vol. 1294. Berlin: Springer-Verlag, 1997. 165–179

    Google Scholar 

  2. Horster P, Michels M, Petersen H. Authenticated encryption schemes with low communication costs. Electr Lett, 1994, 30: 1212–1213

    Article  Google Scholar 

  3. An J H. Authenticated encryption in the public-key setting: security notions and analysis. Available at http://eprint.iacr.org/2001/079

  4. An J H, Dodis Y, Rabin T. On the security of joint signature and encryption. In: Proc of Eurocrypt 2002, LNCS Vol. 2332. Berlin: Springer-Verlag, 2002. 83–107

    Google Scholar 

  5. Bellare M, Namprempre C. Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In: Proc of Asiacrypt 2000, LNCS 1976. Berlin: Springer-Verlag, 2000. 531–545

    Google Scholar 

  6. Dodis Y, Freedman M J, Jarecki S, et al. Versatile padding schemes for joint signature and encryption. In: 11th ACM Conference on Computer and Communication Security. New York: ACM, 2004

    Google Scholar 

  7. Matsuda T, Matsuura K, Schuldt J C N. Efficient constructions of signcryption schemes and signcryption composability. In: Progress in Cryptology-INDOCRYPT 2009, LNCS Vol. 5922. Berlin: Springer-Verlag, 2009. 321–342

    Chapter  Google Scholar 

  8. Shamir A. Identity-based cryptosystems and signature schemes. In: Proc of Crypto 1984, LNCS Vol. 196. Berlin: Springer-Verlag, 1984. 47–53

    Google Scholar 

  9. Boneh D, Franklin M. Identity-based encryption from the Weil pairing. In: Proc of CRYPTO 2001, LNCS Vol. 2139. Berlin: Springer-Verlag, 2001. 213–229

    Google Scholar 

  10. Lynn B. Authenticated identity-based encryption. Available at http://eprint.iacr.org/2002/072.

  11. Barreto P S L M, Libert B, McCullagh N, et al. Efficient and provably-secure identity based signatures and signcryption from bilinear maps. In: Pro of Asiacrypt 2005, LNCS Vol. 3788. Berlin: Springer-Verlag, 2005. 515–532

    Chapter  Google Scholar 

  12. Chen L, Malone-Lee J. Improved identity-based signcryption. In: Proc of PKC 2005, LNCS Vol. 3386. Berlin: Springer-Verlag, 2005. 362–379

    Google Scholar 

  13. Li F, Hu Y, Li G. An efficient identity-based signcryption scheme (In Chinese). Chinese J Comput, 2006, 29: 1641–1647

    MathSciNet  Google Scholar 

  14. Li F, Shirase M, Takagi T. Efficient multi-PKG ID-based signcryption for Ad hoc networks. In: Proc of Information Security and Cryptology, LNCS Vol. 5487. Berlin: Springer-Verlag, 2009. 289–304

    Chapter  Google Scholar 

  15. Bellare M, Boldyreva A, Micali S. Public-key encryption in a multi-user setting: security proofs and improvements. In: Proc of Eurocrypt 2000, LNCS Vol. 1807. Berlin: Springer-Verlag, 2000. 259–274

    Google Scholar 

  16. Kurosawa K. Multi-recipient public-key encryption with shortened ciphertext. In: Proc of PKC 2002, LNCS Vol. 2274. Berlin: Springer-Verlag, 2002. 48–63

    Google Scholar 

  17. Bellare M, Boldyreva A, Staddon J. Randomness re-use in multi-recipient encryption scheme. In: Proc of PKC 2003, LNCS Vol. 2567. Berlin: Springer-Verlag, 2003. 85–99

    Google Scholar 

  18. Baek J, Safavi-Naini R, Susilo W. Efficient Multi-receiver identity-based encryption and its application to broadcast encryption. In: Proc of PKC 2005, LNCS Vol. 3386. Berlin: Springer-Verlag, 2005. 380–397

    Google Scholar 

  19. Zheng Y. Signcryption and its applications in efficient public key solutions. In: Proc of ISW 1997, LNCS Vol. 1396. Berlin: Springer-Verlag, 1997. 291–312

    Google Scholar 

  20. Alt S. Authenticated hybrid encryption for multiple recipients. Available at http://eprint.iacr.org/2006/029

  21. Duan S, Cao Z. Efficient and provably secure multi-receiver identity-based signcryption. In: Proc of ACISP 2006, LNCS Vol. 4058. Berlin: Springer-Verlag, 2006. 195–206

    Google Scholar 

  22. Yu Y, Yang B, Huang X, et al. Efficient identity-based signcryption scheme for multiple receivers. In: Proc of ATC 2007, LNCS Vol. 4610. Berlin: Springer-Verlag, 2007. 13–21

    Google Scholar 

  23. Selvi S S D, Vivek S S, Gopalakrishnan R, et al. Cryptanalysis of ID-based signcryption scheme for multiple receivers. Available at http://eprint.iacr.org/2008/238

  24. Selvi S S D, Vivek S S, Srinivasan R, et al. An efficient identity-based signcryption scheme for multiple receivers. In: Advances in Information and Computer Security 2009, LNCS Vol. 5824. Berlin: Springer-Verlag, 2009. 71–88

    Google Scholar 

  25. Fujisaki E, Okamoto T. Secure integration of asymmetirc and symmetric encryption schemes. In: Proc of Crypto 1999, LNCS Vol. 1666. Berlin: Springer-Verlag, 1999. 537–554

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to YinXia Sun.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Sun, Y., Li, H. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction. Sci. China Inf. Sci. 53, 557–566 (2010). https://doi.org/10.1007/s11432-010-0061-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-010-0061-5

Keywords

Navigation