Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model

被引:5
|
作者
Zhu, Guobin [1 ]
Xiong, Hu [2 ]
Qin, Zhiguang [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[2] Chongqing Key Lab Comp Network & Commun Technol, Chongqing 400065, Peoples R China
基金
中国国家自然科学基金;
关键词
Identity based cryptosystem; Key-insulated; Signcryption; Standard model; Cryptanalysis; EFFICIENT;
D O I
10.1007/s11277-014-1936-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
To achieve unforgeability and confidentiality simultaneously, signcryption has been introduced with better efficiency than the signature-then-encryption approach in terms of computational costs and communication overheads. Taking the key leakage into account, it is desirable to design identity-based key-insulated signcryption (ID-KI-SC) scheme to reduce the damage caused by the secret key leakage. In this paper, we have shown that all of the existing ID-KI-SC scheme can not offer either the unforgeability property or the indistinguishability property. Furthermore, an improved scheme along with the formal security proof in the standard model has been suggested in this paper. In view of computational cost and communication overhead, our scheme is amongst the most efficient IB-SC schemes secure in the standard model.
引用
收藏
页码:1401 / 1416
页数:16
相关论文
共 50 条
  • [1] Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model
    Guobin Zhu
    Hu Xiong
    Zhiguang Qin
    Wireless Personal Communications, 2014, 79 : 1401 - 1416
  • [2] Identity-Based Key-Insulated Signcryption
    Chen, Jianhong
    Chen, Kefei
    Wang, Yongtao
    Li, Xiangxue
    Long, Yu
    Wan, Zhongmei
    INFORMATICA, 2012, 23 (01) : 27 - 45
  • [3] Identity-based key-insulated signcryption scheme
    Wang, Huige
    Cao, Hao
    Li, Desheng
    Journal of Computational Information Systems, 2013, 9 (08): : 3067 - 3075
  • [4] An Improvement of an Identity-Based Key-insulated Signcryption
    Zhu, Guobin
    Xiong, Hu
    Wang, Ruijin
    Qin, Zhiguang
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 97 - 104
  • [5] Key-Insulated Signcryption
    Fan, Jia
    Zheng, Yuliang
    Tang, Xiaohu
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2013, 19 (10) : 1351 - 1374
  • [6] Strongly secure certificateless key-insulated signature secure in the standard model
    Yanan Chen
    Weixiang Xu
    Hu Xiong
    annals of telecommunications - annales des télécommunications, 2015, 70 : 395 - 405
  • [7] Strongly secure certificateless key-insulated signature secure in the standard model
    Chen, Yanan
    Xu, Weixiang
    Xiong, Hu
    ANNALS OF TELECOMMUNICATIONS, 2015, 70 (9-10) : 395 - 405
  • [8] Identity-based key-insulated signature with secure key-updates
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Li, Xiangxue
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 13 - +
  • [9] Security analysis on "Strongly secure certificateless key-insulated signature secure in the standard model"
    Wang, Feng
    Xu, Li
    Pan, Jeng-Shyang
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, : 195 - 198
  • [10] Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model
    Li, Xiangxue
    Qian, Haifeng
    Weng, Jian
    Yu, Yu
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (3-4) : 503 - 511