Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model

被引:5
|
作者
Zhu, Guobin [1 ]
Xiong, Hu [2 ]
Qin, Zhiguang [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[2] Chongqing Key Lab Comp Network & Commun Technol, Chongqing 400065, Peoples R China
基金
中国国家自然科学基金;
关键词
Identity based cryptosystem; Key-insulated; Signcryption; Standard model; Cryptanalysis; EFFICIENT;
D O I
10.1007/s11277-014-1936-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
To achieve unforgeability and confidentiality simultaneously, signcryption has been introduced with better efficiency than the signature-then-encryption approach in terms of computational costs and communication overheads. Taking the key leakage into account, it is desirable to design identity-based key-insulated signcryption (ID-KI-SC) scheme to reduce the damage caused by the secret key leakage. In this paper, we have shown that all of the existing ID-KI-SC scheme can not offer either the unforgeability property or the indistinguishability property. Furthermore, an improved scheme along with the formal security proof in the standard model has been suggested in this paper. In view of computational cost and communication overhead, our scheme is amongst the most efficient IB-SC schemes secure in the standard model.
引用
收藏
页码:1401 / 1416
页数:16
相关论文
共 50 条
  • [31] Generic Construction of Identity-Based Strong Key-Insulated Signature
    Zhou, Dehua
    Weng, Jian
    Chen, Kefei
    Zheng, Dong
    JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (04): : 629 - 635
  • [32] Information-Theoretically Secure Key-Insulated Key-Agreement
    Seito, Takenobu
    Shikata, Junji
    2011 IEEE INFORMATION THEORY WORKSHOP (ITW), 2011,
  • [33] Improved Hierarchical Identity-Based Parallel Key-Insulated Encryption
    Ren, Yanli
    Wang, Shuozhong
    Zhang, Xinpeng
    JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (04): : 647 - 658
  • [34] Identity-based key-insulated signature without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Ma, ChangShe
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1253 - 1258
  • [35] A fully secure lattice-based signcryption with designated equality test in standard model
    Xiao, Kaifeng
    Chen, Xinjian
    Li, Hongbo
    Huang, Jianye
    Susilo, Willy
    Huang, Qiong
    INFORMATION SCIENCES, 2024, 658
  • [36] Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme
    Wang, Xu An
    Weng, Jian
    Yang, Xiaoyuan
    Zhang, Minqing
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (02) : 219 - 225
  • [37] Identity-based parallel key-insulated signature: Framework and construction
    Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
    不详
    不详
    J. Res. Pract. Inf. Technol., 2008, 1 (55-68):
  • [38] CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles
    Ren, Yanli
    Gu, Dawu
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (01) : 153 - 162
  • [39] An improved semantically-secure identity-based signcryption scheme in the standard model
    Jin, Zhengping
    Wen, Qiaoyan
    Du, Hongzhen
    COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (03) : 545 - 552
  • [40] Identity-based hierarchical strongly key-insulated encryption and its application
    Hanaoka, Y
    Hanaoka, G
    Shikata, J
    Imai, H
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 495 - 514