Improvement of an ID-Based Threshold Signcryption Scheme
Abstract
Signcryption can realize the function of encryption and signature in a reasonable logic step, which can lower computational costs and communication overheads. In 2008, Fagen Li et al. proposed an efficient secure id-based threshold signcryption scheme. The authors declared that their scheme had the attributes of confidentiality and unforgeability in the random oracle model. However, our previous analysis shows that scheme is insecure against malicious attackers. Further, we propose a probably-secure improved scheme to correct the vulnerable and give the unforgeability and confidentiality of our improved scheme under the existing security assumption.
Keywords
Identity-based Signcryption Bilinear pairing CryptanalysisNotes
Acknowledgment
The authors would like to thank the editors and anonymous reviewers for their valuable comments. This work is supported by the National Natural Science Foundation of China under Grant No. 60873235 and 60473099, the National Grand Fundamental Research 973 Program of China (Grant No. 2009CB320706), Scientific and Technological Developing Scheme of Jilin Province (20080318), and Program of New Century Excellent Talents in University (NCET-06-0300).
References
- 1.Zheng Y (1997) Digital signcryption or how to achieve cost (signature & Encryption) ≪ cost (signature) + cost (encryption), In: Proceedings of advances in CRYPTO’97, LNCS 1294. Springer, Berlin, pp 165–179Google Scholar
- 2.Bao F, Deng RH (1997) A signcryption scheme with signature directly verifiable by public key. PKC’98 LNCS, vol 1431. Springer, Berlin, pp 55–59Google Scholar
- 3.Chow SSM, Yiu SM, Hui LCK, Chow KP (2004) Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. ICISC’03 LNCS, vol 2971. Springer, Berlin, pp 352–269Google Scholar
- 4.Boyen X, Multipurpose identity based signcryption: a swiss army knife for identity based cryptography. CRYPT’03 LNCS, vol 2729. Springer, Berlin, pp 383–399Google Scholar
- 5.Mu Y, Varadharajan V (2000) Distributed signcryption. INDOCRYPT’00. LNCS, vol 1977. Springer, Berlin, pp 155–164Google Scholar
- 6.Yang G, Wong DS, Deng X (2005) Analysis and improvement of a signcryption scheme with key privacy. ISC’05. LNCS, vol 3650. Springer, Berlin, pp 218–232Google Scholar
- 7.SteinFeld R, Zheng Y (2000) A signcryption scheme based on integer factorization. ISW’00. LNCS, vol 1975. Springer, Berlin, pp 308–322Google Scholar
- 8.Libert B, Quisquater J (2004) Efficient signcryption with key prevacy from gap Diffie-Hellman groups. PKC’04. LNCS vol 2947. Springer, Berlin, pp 187–200Google Scholar
- 9.Baek J, Steinfeld R, Zheng Y (2002) Formal proofs for the security of signcryption. PKC’02. LNCS vol 2274. Springer, Berlin, pp 80–98Google Scholar
- 10.Shamir A (1984) Identity-based cryptosystems and signature schemes. CRYPTO’84. LNCS vol 196. Springer, Berlin, pp 47–53Google Scholar
- 11.Boneh D, Franklin M (2001) Identity-based encryption from well pairing. CRYPTO’01. LNCS vol 2139. Springer, Berlin, pp 213–229Google Scholar
- 12.Barreto PSLM, Libert B, Mccullagh N, Quisquater JJ (2005) Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. ASIACRYPT’05. LNCS, vol 3788. Springer, Berlin, pp 515–532Google Scholar
- 13.Li F, Hu X, Nie X (2009) A new multi-receiver ID-based signcryption scheme for group communication. ICCCAS’2009. IEEE Press, San Jose, pp 296–300Google Scholar
- 14.Han Y, Gui X (2009) Multi-recipient signcryption for secure group communication. ICIEA 2009, pp 161–165Google Scholar
- 15.Jin Z, Wen Q, Du H (2010) An improved semantically-secure identity-based signcryption scheme in the standard model. Comput Electr Eng 36(3):545–552CrossRefMATHGoogle Scholar
- 16.Huang X, Susilo W, Mu Y, Zhang E (2005) Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world. 19th international conference on advanced information networking and applications, Taiwan, pp 649–654Google Scholar
- 17.Liu Z, Hu Y, Zhang X, Ma H (2010) Certificateless signcryption scheme in the standard model. Inf Sci 180(3):452–464CrossRefMATHMathSciNetGoogle Scholar
- 18.Yu Y, Bo Y, Sun Y, Zhu S-l (2009) Identity based signcryption scheme without random oracles. Comput Stand Interfac 31(1):56–62CrossRefGoogle Scholar
- 19.Desmedt Y (1987) Society and group oriented cryptography: a now concept. CRYPTO’87. LNCS, vol 293. Springer, Berlin, pp 120–127Google Scholar
- 20.Desmedt Y, Frankel Y (1991) Shared generation of authenticators and signatures. CRYPTO’91. LNCS, vol 576. Springer, Berlin, pp 457–469Google Scholar
- 21.Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 2(2):120–126CrossRefMathSciNetGoogle Scholar
- 22.Baek J, Zheng Y (2004) Identity-based threshold signature scheme from the bilinear pairings. International conference on information technology, Las Vegas, pp 124–128Google Scholar
- 23.Duan S, Cao Z, Lu R (2004) Robust ID-based threshold signcryption scheme from pairings. International conference on information security, Shanghai, pp 33–37Google Scholar
- 24.Peng C, Li X (2005) An identity-based threshold signcryption scheme with semantic security. Computational intelligence and security 2005. LNAI, vol 3902. Springer, Berlin, pp 173–179Google Scholar
- 25.Libert B, Quisquater JJ (2003) Anew identity based signcryption schemes from pairings. IEEE information theory workshop, Paris, pp 155–158Google Scholar
- 26.Li F, Yu Y (2008) An efficient and provably secure ID-based threshold signcryption scheme, ICCCAS. Springer, Xiamen, pp 488–492Google Scholar
- 27.Malone LJ (2002) Identity based signcryption. In: Cryptology ePrint archive. Report, (14):098–106Google Scholar
- 28.Chow SSM, Yiu SM, Hui LCK, Chow KP (2004) Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity. In: Lin J-I, Lee D-H (eds) ICISC 2003, LNCS, vol 2971. Springer, Berlin, pp 352–369Google Scholar
- 29.Boyen X (2003) Multipurpose identity based signcryption: a Swiss army knife for identity based cryptography. In: Boneh D (ed) CRYPTO 2003. LNCS, vol 2729. Springer, Berlin, pp 383–399Google Scholar