Nothing Special   »   [go: up one dir, main page]

Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 255))

Abstract

As one of the fundamental cryptographic primitives, signcryption can achieve unforgeability and confidentiality simultaneously at the cost significantly lower than the signature-then-encryption approach in terms of computational costs and communication overheads. In view of the damage caused by the secret key leakage, Chen et al. proposed an efficient identity-based key-insulated signcryption (ID-KI-SC) scheme secure in the standard model recently. However, in this paper, we show that their scheme does not achieve the indistinguishability against adaptively chosen ciphertext attacks (IND-CCA2) and existential unforgeability against adaptively chosen message attacks (EUF-CMA). Furthermore, we propose an improved scheme that remedies the weakness of Chen et al.’s scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost(encryption). In: Proceeding Advances in Cryptology-CRYPTO’97, LNCS, vol. 1294, pp. 165–179 Springer, Heidelberg (1997)

    Google Scholar 

  2. Dent, A.W., Zheng, Y.: Practical Signcryption, pp. 1–269. Springer, New York (2010)

    Book  MATH  Google Scholar 

  3. Shamir, A.: Identity-based cryptosystems and signature schemes, In: Proc. Advances in Cryptology-CRYPTO’84, LNCS, vol. 196, pp. 47–53, Springer, Heidelberg (1984)

    Google Scholar 

  4. Malone-Lee, J.: Identity based signcryption, Cryptology ePrint Archive, Report 2002/098, 2002. Available from: http://eprint.iacr.org/2002/098 (2002)

  5. Chow, S. S. M., Yiu, S. M., Hui, L. C. K et al.: Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity, In: ICISC 2003, LNCS, vol. 2971, pp. 352–369 Springer, Heidelberg (2004)

    Google Scholar 

  6. Libert, B,. Quisquater, J.J.: A new identity based signcryption schemes from pairings, In: Proceeding 2003 IEEE Information Theory Workshop, pp. 155–158, Paris, France (2003)

    Google Scholar 

  7. Bellare, M., P. Rogaway.: Random oracles are practical: A paradigm for designing efficient protocols, In: Proc. 1st ACM CCS, pp. 62–73. ACM Press. (1993)

    Google Scholar 

  8. Bellare, M., A. Boldyreva, A. Palacio.: An uninstantiable random-oracle-model scheme for a hybrid-encryption problem, In: EUROCRYPT 2004, LNCS, vol. 3027, pp. 171–188, Springer, Heidelberg (2004)

    Google Scholar 

  9. Jin, Z., Wen, Q., Du, H.: An improved semantically-secure identity-based signcryption scheme in the standard model. Comput. Electr. Eng. 36, 545–552 (2010)

    Article  MATH  Google Scholar 

  10. Li, F., Liao, Y., Qin, Z.: Analysis of an identity-based signcryption scheme in the standard model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A, 268–269 (2011)

    Article  Google Scholar 

  11. Chen, J., Chen, K., Wang, Y., et al.: Identity-based key-insulated signcryption. Informatica 23, 27–45 (2012)

    MATH  Google Scholar 

  12. Dodis, Y., Katz, J., Xu, S., Yung, M.: Strong key-insulated public key cryptosystems, In: Proceeding Advances in Cryptology-Eurocrypt’ 02, LNCS 2332, pp. 65–82 Springer, Heidelberg (2002)

    Google Scholar 

  13. Li, X., Qian, H., Weng, J., Yu, Y.: Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model. Math. Comput. Model. 57, 503–511 (2013)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

The authors would like to acknowledge National Natural Science Foundation of China under Grant Nos. 61003230, 61370026, Chongqing Key Lab of Computer Network and Communication Technology under Grant No. CY-CNCL-2012-02, the national key scientific and technological special project of China under Grant No. 2011ZX03002-002-03.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guobin Zhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Zhu, G., Xiong, H., Wang, R., Qin, Z. (2014). An Improvement of an Identity-Based Key-insulated Signcryption. In: Patnaik, S., Li, X. (eds) Proceedings of International Conference on Computer Science and Information Technology. Advances in Intelligent Systems and Computing, vol 255. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1759-6_12

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1759-6_12

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1758-9

  • Online ISBN: 978-81-322-1759-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics