Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model

被引:5
|
作者
Zhu, Guobin [1 ]
Xiong, Hu [2 ]
Qin, Zhiguang [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[2] Chongqing Key Lab Comp Network & Commun Technol, Chongqing 400065, Peoples R China
基金
中国国家自然科学基金;
关键词
Identity based cryptosystem; Key-insulated; Signcryption; Standard model; Cryptanalysis; EFFICIENT;
D O I
10.1007/s11277-014-1936-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
To achieve unforgeability and confidentiality simultaneously, signcryption has been introduced with better efficiency than the signature-then-encryption approach in terms of computational costs and communication overheads. Taking the key leakage into account, it is desirable to design identity-based key-insulated signcryption (ID-KI-SC) scheme to reduce the damage caused by the secret key leakage. In this paper, we have shown that all of the existing ID-KI-SC scheme can not offer either the unforgeability property or the indistinguishability property. Furthermore, an improved scheme along with the formal security proof in the standard model has been suggested in this paper. In view of computational cost and communication overhead, our scheme is amongst the most efficient IB-SC schemes secure in the standard model.
引用
收藏
页码:1401 / 1416
页数:16
相关论文
共 50 条
  • [21] Efficient and Secure Identity-based Strong Key-Insulated Signature Scheme without Pairings
    Reddy, P. Vasudeva
    Babu, A. Ramesh
    Gayathri, N. B.
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (10) : 1211 - 1218
  • [22] ID-based key-insulated signcryption with equality test in cloud computing
    Alornyo, Seth
    Mireku, Kingsford Kissi
    Mohammed, Mustapha Adamu
    Adu-Gyamfi, Daniel
    Asante, Michael
    SN APPLIED SCIENCES, 2021, 3 (04):
  • [23] Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model
    Lu, Yang
    Li, Jiguo
    Shen, Jian
    COMPUTER JOURNAL, 2017, 60 (12): : 1729 - 1744
  • [24] Identity based key-insulated encryption with outsourced equality test
    Alornyo, Seth
    Zhao, Yanan
    Zhu, Guobin
    Xiong, Hu
    International Journal of Network Security, 2020, 22 (02) : 257 - 264
  • [25] Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings
    Zhou, Caixue
    Zhao, Zhiqiang
    Zhou, Wan
    Mei, Yuan
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [26] A lightweight identity based generalized signcryption scheme for secure communication in standard model
    Singh T.
    Kumar M.
    Gelmecha D.J.
    Thakur G.K.
    Tyagi V.
    Sori W.J.
    International Journal of Information Technology, 2024, 16 (2) : 1221 - 1229
  • [27] A provably secure, shortest, and efficient identity based signcryption technique in the standard model
    Aithekar, Ashutosh
    Gupta, Pratik
    Dharminder, Dharminder
    SECURITY AND PRIVACY, 2023, 6 (01)
  • [28] AN IMPROVED CERTIFICATELESS STRONG KEY-INSULATED SIGNATURE SCHEME IN THE STANDARD MODEL
    Lu, Yang
    Zhang, Quanling
    Li, Jiguo
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2015, 9 (03) : 353 - 373
  • [29] Identity-based key-insulated signature without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Ma, Changshe
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 470 - +
  • [30] Identity-based parallel key-insulated signature: Framework and construction
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Li, Xiangxue
    JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2008, 40 (01): : 55 - 68