2017
DOI: 10.3390/info8020058
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Identity-Based Signcryption Scheme in the Standard Model

Abstract: Identity-based signcryption is a useful cryptographic primitive that provides both authentication and confidentiality for identity-based crypto systems. It is challenging to build a secure identity-based signcryption scheme that can be proven secure in a standard model. In this paper, we address the issue and propose a novel construction of identity-based signcryption which enjoys IND-CCA security and existential unforgeability without resorting to the random oracle model. Comparisons demonstrate that the new … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…To overcome the certificatemanagement problem of PKI, several iD-based signcryption schemes were proposed. [45][46][47][48][49] In these schemes, users send request for obtaining private keys to thirdparty called private key generator (PKG). The sender request contains ID, phone number, and email when it reaches the PKG, after which the PKG generates private keys for a secure communication using a master secret key and other system parameters which are already stored in the PKG.…”
Section: Limitationmentioning
confidence: 99%
“…To overcome the certificatemanagement problem of PKI, several iD-based signcryption schemes were proposed. [45][46][47][48][49] In these schemes, users send request for obtaining private keys to thirdparty called private key generator (PKG). The sender request contains ID, phone number, and email when it reaches the PKG, after which the PKG generates private keys for a secure communication using a master secret key and other system parameters which are already stored in the PKG.…”
Section: Limitationmentioning
confidence: 99%
“…Hence, to remove such deficiencies, Malone Lee [15] coined a new topic, by combining the capabilities of the identity-based signature and identity-based encryption into a single step, called identity-based signcryption. After the first identity-based signcryption scheme, a number of identity-based signcryption schemes were introduced in [29][30][31][32][33][34][35]. Hence, identity-based signcryption schemes are suffering from the key escrow problem.…”
Section: Related Workmentioning
confidence: 99%
“…Thwin [36][37][38] and Vasupongayya [39] utilizes the idea of blockchain together with proxy re-encryption scheme for the transmission of personal health information securely and to get out of the network performance concerns, security, privacy, storage limitations of sensors, scalability, revocation of consent, secure against Adversary's attacks. Li et al [40] and Luo et al [41] , proposed certificateless online/off-line signcryption schemes. Lai and colleagues [42,43] proposed the signcryption based on ID, that undergoes key escrow issue and the server-side scalability problem.…”
Section: Introductionmentioning
confidence: 99%